May 15 17:28:07.032543 kernel: Linux version 5.15.182-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu May 15 09:06:41 -00 2025 May 15 17:28:07.032570 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=f8c1bc5ff10765e781843bfc97fc5357002a3f8a120201a0e954fce1d2ba48f0 May 15 17:28:07.032580 kernel: BIOS-provided physical RAM map: May 15 17:28:07.032591 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable May 15 17:28:07.032598 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved May 15 17:28:07.032604 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved May 15 17:28:07.032612 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bffdcfff] usable May 15 17:28:07.032619 kernel: BIOS-e820: [mem 0x00000000bffdd000-0x00000000bfffffff] reserved May 15 17:28:07.032626 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved May 15 17:28:07.032633 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved May 15 17:28:07.032639 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000013fffffff] usable May 15 17:28:07.032646 kernel: BIOS-e820: [mem 0x000000fd00000000-0x000000ffffffffff] reserved May 15 17:28:07.032654 kernel: NX (Execute Disable) protection: active May 15 17:28:07.032661 kernel: SMBIOS 3.0.0 present. May 15 17:28:07.032669 kernel: DMI: OpenStack Foundation OpenStack Nova, BIOS 1.16.3-debian-1.16.3-2 04/01/2014 May 15 17:28:07.032676 kernel: Hypervisor detected: KVM May 15 17:28:07.032683 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 15 17:28:07.032690 kernel: kvm-clock: cpu 0, msr a519a001, primary cpu clock May 15 17:28:07.032699 kernel: kvm-clock: using sched offset of 6696728948 cycles May 15 17:28:07.032707 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 15 17:28:07.032714 kernel: tsc: Detected 1996.249 MHz processor May 15 17:28:07.032722 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 15 17:28:07.032730 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 15 17:28:07.032737 kernel: last_pfn = 0x140000 max_arch_pfn = 0x400000000 May 15 17:28:07.032745 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 15 17:28:07.032752 kernel: last_pfn = 0xbffdd max_arch_pfn = 0x400000000 May 15 17:28:07.032760 kernel: ACPI: Early table checksum verification disabled May 15 17:28:07.032769 kernel: ACPI: RSDP 0x00000000000F51E0 000014 (v00 BOCHS ) May 15 17:28:07.032776 kernel: ACPI: RSDT 0x00000000BFFE1B65 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 17:28:07.032784 kernel: ACPI: FACP 0x00000000BFFE1A49 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 17:28:07.032791 kernel: ACPI: DSDT 0x00000000BFFE0040 001A09 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 17:28:07.032799 kernel: ACPI: FACS 0x00000000BFFE0000 000040 May 15 17:28:07.032806 kernel: ACPI: APIC 0x00000000BFFE1ABD 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 15 17:28:07.032813 kernel: ACPI: WAET 0x00000000BFFE1B3D 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 17:28:07.032821 kernel: ACPI: Reserving FACP table memory at [mem 0xbffe1a49-0xbffe1abc] May 15 17:28:07.032830 kernel: ACPI: Reserving DSDT table memory at [mem 0xbffe0040-0xbffe1a48] May 15 17:28:07.032837 kernel: ACPI: Reserving FACS table memory at [mem 0xbffe0000-0xbffe003f] May 15 17:28:07.032844 kernel: ACPI: Reserving APIC table memory at [mem 0xbffe1abd-0xbffe1b3c] May 15 17:28:07.032851 kernel: ACPI: Reserving WAET table memory at [mem 0xbffe1b3d-0xbffe1b64] May 15 17:28:07.032859 kernel: No NUMA configuration found May 15 17:28:07.032869 kernel: Faking a node at [mem 0x0000000000000000-0x000000013fffffff] May 15 17:28:07.032877 kernel: NODE_DATA(0) allocated [mem 0x13fff7000-0x13fffcfff] May 15 17:28:07.032886 kernel: Zone ranges: May 15 17:28:07.032894 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 15 17:28:07.032902 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] May 15 17:28:07.032910 kernel: Normal [mem 0x0000000100000000-0x000000013fffffff] May 15 17:28:07.032917 kernel: Movable zone start for each node May 15 17:28:07.032925 kernel: Early memory node ranges May 15 17:28:07.032932 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] May 15 17:28:07.032940 kernel: node 0: [mem 0x0000000000100000-0x00000000bffdcfff] May 15 17:28:07.032950 kernel: node 0: [mem 0x0000000100000000-0x000000013fffffff] May 15 17:28:07.032957 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000013fffffff] May 15 17:28:07.032965 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 15 17:28:07.032972 kernel: On node 0, zone DMA: 97 pages in unavailable ranges May 15 17:28:07.032980 kernel: On node 0, zone Normal: 35 pages in unavailable ranges May 15 17:28:07.032988 kernel: ACPI: PM-Timer IO Port: 0x608 May 15 17:28:07.032995 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 15 17:28:07.033003 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 May 15 17:28:07.033010 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) May 15 17:28:07.033020 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 15 17:28:07.033027 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 15 17:28:07.033035 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 15 17:28:07.033042 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 15 17:28:07.033050 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 15 17:28:07.033057 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs May 15 17:28:07.033066 kernel: [mem 0xc0000000-0xfeffbfff] available for PCI devices May 15 17:28:07.033073 kernel: Booting paravirtualized kernel on KVM May 15 17:28:07.033081 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 15 17:28:07.033090 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 May 15 17:28:07.033111 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 May 15 17:28:07.033120 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 May 15 17:28:07.033127 kernel: pcpu-alloc: [0] 0 1 May 15 17:28:07.033135 kernel: kvm-guest: stealtime: cpu 0, msr 13bc1c0c0 May 15 17:28:07.033142 kernel: kvm-guest: PV spinlocks disabled, no host support May 15 17:28:07.033150 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1031901 May 15 17:28:07.033158 kernel: Policy zone: Normal May 15 17:28:07.033167 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=f8c1bc5ff10765e781843bfc97fc5357002a3f8a120201a0e954fce1d2ba48f0 May 15 17:28:07.033177 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 15 17:28:07.033185 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 15 17:28:07.033193 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 15 17:28:07.033200 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 15 17:28:07.033208 kernel: Memory: 3968276K/4193772K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47472K init, 4108K bss, 225236K reserved, 0K cma-reserved) May 15 17:28:07.033216 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 May 15 17:28:07.033224 kernel: ftrace: allocating 34585 entries in 136 pages May 15 17:28:07.033231 kernel: ftrace: allocated 136 pages with 2 groups May 15 17:28:07.033240 kernel: rcu: Hierarchical RCU implementation. May 15 17:28:07.033249 kernel: rcu: RCU event tracing is enabled. May 15 17:28:07.033257 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. May 15 17:28:07.033264 kernel: Rude variant of Tasks RCU enabled. May 15 17:28:07.033272 kernel: Tracing variant of Tasks RCU enabled. May 15 17:28:07.033280 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 15 17:28:07.033287 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 May 15 17:28:07.033295 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 May 15 17:28:07.033302 kernel: Console: colour VGA+ 80x25 May 15 17:28:07.033312 kernel: printk: console [tty0] enabled May 15 17:28:07.033319 kernel: printk: console [ttyS0] enabled May 15 17:28:07.033327 kernel: ACPI: Core revision 20210730 May 15 17:28:07.033334 kernel: APIC: Switch to symmetric I/O mode setup May 15 17:28:07.033342 kernel: x2apic enabled May 15 17:28:07.033350 kernel: Switched APIC routing to physical x2apic. May 15 17:28:07.033357 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 15 17:28:07.033365 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized May 15 17:28:07.033373 kernel: Calibrating delay loop (skipped) preset value.. 3992.49 BogoMIPS (lpj=1996249) May 15 17:28:07.033382 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 May 15 17:28:07.033390 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 May 15 17:28:07.033398 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 15 17:28:07.033405 kernel: Spectre V2 : Mitigation: Retpolines May 15 17:28:07.033413 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 15 17:28:07.033421 kernel: Speculative Store Bypass: Vulnerable May 15 17:28:07.033428 kernel: x86/fpu: x87 FPU will use FXSAVE May 15 17:28:07.033436 kernel: Freeing SMP alternatives memory: 32K May 15 17:28:07.033443 kernel: pid_max: default: 32768 minimum: 301 May 15 17:28:07.033452 kernel: LSM: Security Framework initializing May 15 17:28:07.033460 kernel: SELinux: Initializing. May 15 17:28:07.033467 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 15 17:28:07.033475 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 15 17:28:07.033483 kernel: smpboot: CPU0: AMD Intel Core i7 9xx (Nehalem Class Core i7) (family: 0x6, model: 0x1a, stepping: 0x3) May 15 17:28:07.033491 kernel: Performance Events: AMD PMU driver. May 15 17:28:07.033504 kernel: ... version: 0 May 15 17:28:07.033514 kernel: ... bit width: 48 May 15 17:28:07.033522 kernel: ... generic registers: 4 May 15 17:28:07.033530 kernel: ... value mask: 0000ffffffffffff May 15 17:28:07.033538 kernel: ... max period: 00007fffffffffff May 15 17:28:07.033545 kernel: ... fixed-purpose events: 0 May 15 17:28:07.033555 kernel: ... event mask: 000000000000000f May 15 17:28:07.033563 kernel: signal: max sigframe size: 1440 May 15 17:28:07.033571 kernel: rcu: Hierarchical SRCU implementation. May 15 17:28:07.033579 kernel: smp: Bringing up secondary CPUs ... May 15 17:28:07.033587 kernel: x86: Booting SMP configuration: May 15 17:28:07.033596 kernel: .... node #0, CPUs: #1 May 15 17:28:07.033605 kernel: kvm-clock: cpu 1, msr a519a041, secondary cpu clock May 15 17:28:07.033612 kernel: kvm-guest: stealtime: cpu 1, msr 13bd1c0c0 May 15 17:28:07.033620 kernel: smp: Brought up 1 node, 2 CPUs May 15 17:28:07.033628 kernel: smpboot: Max logical packages: 2 May 15 17:28:07.033636 kernel: smpboot: Total of 2 processors activated (7984.99 BogoMIPS) May 15 17:28:07.033644 kernel: devtmpfs: initialized May 15 17:28:07.033652 kernel: x86/mm: Memory block size: 128MB May 15 17:28:07.033660 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 15 17:28:07.033670 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) May 15 17:28:07.033678 kernel: pinctrl core: initialized pinctrl subsystem May 15 17:28:07.033686 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 15 17:28:07.033694 kernel: audit: initializing netlink subsys (disabled) May 15 17:28:07.033702 kernel: audit: type=2000 audit(1747330087.072:1): state=initialized audit_enabled=0 res=1 May 15 17:28:07.033710 kernel: thermal_sys: Registered thermal governor 'step_wise' May 15 17:28:07.033718 kernel: thermal_sys: Registered thermal governor 'user_space' May 15 17:28:07.033726 kernel: cpuidle: using governor menu May 15 17:28:07.033734 kernel: ACPI: bus type PCI registered May 15 17:28:07.033744 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 15 17:28:07.033752 kernel: dca service started, version 1.12.1 May 15 17:28:07.033760 kernel: PCI: Using configuration type 1 for base access May 15 17:28:07.033768 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 15 17:28:07.033776 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 15 17:28:07.033784 kernel: ACPI: Added _OSI(Module Device) May 15 17:28:07.033792 kernel: ACPI: Added _OSI(Processor Device) May 15 17:28:07.033800 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 15 17:28:07.033808 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 15 17:28:07.033818 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 15 17:28:07.033826 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 15 17:28:07.033834 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 15 17:28:07.033842 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 15 17:28:07.033849 kernel: ACPI: Interpreter enabled May 15 17:28:07.033857 kernel: ACPI: PM: (supports S0 S3 S5) May 15 17:28:07.033865 kernel: ACPI: Using IOAPIC for interrupt routing May 15 17:28:07.033873 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 15 17:28:07.033881 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F May 15 17:28:07.033891 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 15 17:28:07.034039 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] May 15 17:28:07.036166 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. May 15 17:28:07.036186 kernel: acpiphp: Slot [3] registered May 15 17:28:07.036195 kernel: acpiphp: Slot [4] registered May 15 17:28:07.036205 kernel: acpiphp: Slot [5] registered May 15 17:28:07.036213 kernel: acpiphp: Slot [6] registered May 15 17:28:07.036222 kernel: acpiphp: Slot [7] registered May 15 17:28:07.036236 kernel: acpiphp: Slot [8] registered May 15 17:28:07.036245 kernel: acpiphp: Slot [9] registered May 15 17:28:07.036254 kernel: acpiphp: Slot [10] registered May 15 17:28:07.036263 kernel: acpiphp: Slot [11] registered May 15 17:28:07.036271 kernel: acpiphp: Slot [12] registered May 15 17:28:07.036280 kernel: acpiphp: Slot [13] registered May 15 17:28:07.036288 kernel: acpiphp: Slot [14] registered May 15 17:28:07.036297 kernel: acpiphp: Slot [15] registered May 15 17:28:07.036305 kernel: acpiphp: Slot [16] registered May 15 17:28:07.036316 kernel: acpiphp: Slot [17] registered May 15 17:28:07.036324 kernel: acpiphp: Slot [18] registered May 15 17:28:07.036333 kernel: acpiphp: Slot [19] registered May 15 17:28:07.036341 kernel: acpiphp: Slot [20] registered May 15 17:28:07.036350 kernel: acpiphp: Slot [21] registered May 15 17:28:07.036358 kernel: acpiphp: Slot [22] registered May 15 17:28:07.036366 kernel: acpiphp: Slot [23] registered May 15 17:28:07.036375 kernel: acpiphp: Slot [24] registered May 15 17:28:07.036383 kernel: acpiphp: Slot [25] registered May 15 17:28:07.036392 kernel: acpiphp: Slot [26] registered May 15 17:28:07.036402 kernel: acpiphp: Slot [27] registered May 15 17:28:07.036411 kernel: acpiphp: Slot [28] registered May 15 17:28:07.036419 kernel: acpiphp: Slot [29] registered May 15 17:28:07.036428 kernel: acpiphp: Slot [30] registered May 15 17:28:07.036436 kernel: acpiphp: Slot [31] registered May 15 17:28:07.036445 kernel: PCI host bridge to bus 0000:00 May 15 17:28:07.036543 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 15 17:28:07.036628 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 15 17:28:07.036712 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 15 17:28:07.036792 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] May 15 17:28:07.036870 kernel: pci_bus 0000:00: root bus resource [mem 0xc000000000-0xc07fffffff window] May 15 17:28:07.036948 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 15 17:28:07.037053 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 May 15 17:28:07.037174 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 May 15 17:28:07.037277 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 May 15 17:28:07.037367 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc120-0xc12f] May 15 17:28:07.037457 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] May 15 17:28:07.037545 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] May 15 17:28:07.037639 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] May 15 17:28:07.037728 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] May 15 17:28:07.037825 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 May 15 17:28:07.037918 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI May 15 17:28:07.038006 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB May 15 17:28:07.038123 kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 May 15 17:28:07.038217 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] May 15 17:28:07.038312 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xc000000000-0xc000003fff 64bit pref] May 15 17:28:07.038402 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfeb90000-0xfeb90fff] May 15 17:28:07.038490 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfeb80000-0xfeb8ffff pref] May 15 17:28:07.038596 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 15 17:28:07.038692 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 May 15 17:28:07.038783 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc080-0xc0bf] May 15 17:28:07.038871 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfeb91000-0xfeb91fff] May 15 17:28:07.038960 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xc000004000-0xc000007fff 64bit pref] May 15 17:28:07.039050 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfeb00000-0xfeb7ffff pref] May 15 17:28:07.039166 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 May 15 17:28:07.039261 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] May 15 17:28:07.039351 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfeb92000-0xfeb92fff] May 15 17:28:07.039441 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xc000008000-0xc00000bfff 64bit pref] May 15 17:28:07.039538 kernel: pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 May 15 17:28:07.039627 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc0c0-0xc0ff] May 15 17:28:07.039716 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xc00000c000-0xc00000ffff 64bit pref] May 15 17:28:07.039817 kernel: pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 May 15 17:28:07.039908 kernel: pci 0000:00:06.0: reg 0x10: [io 0xc100-0xc11f] May 15 17:28:07.039996 kernel: pci 0000:00:06.0: reg 0x14: [mem 0xfeb93000-0xfeb93fff] May 15 17:28:07.040085 kernel: pci 0000:00:06.0: reg 0x20: [mem 0xc000010000-0xc000013fff 64bit pref] May 15 17:28:07.044141 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 15 17:28:07.044161 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 15 17:28:07.044171 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 15 17:28:07.044180 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 15 17:28:07.044193 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 May 15 17:28:07.044202 kernel: iommu: Default domain type: Translated May 15 17:28:07.044211 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 15 17:28:07.044321 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device May 15 17:28:07.044416 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 15 17:28:07.044508 kernel: pci 0000:00:02.0: vgaarb: bridge control possible May 15 17:28:07.044521 kernel: vgaarb: loaded May 15 17:28:07.044531 kernel: pps_core: LinuxPPS API ver. 1 registered May 15 17:28:07.044540 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 15 17:28:07.044552 kernel: PTP clock support registered May 15 17:28:07.044561 kernel: PCI: Using ACPI for IRQ routing May 15 17:28:07.044570 kernel: PCI: pci_cache_line_size set to 64 bytes May 15 17:28:07.044579 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] May 15 17:28:07.044588 kernel: e820: reserve RAM buffer [mem 0xbffdd000-0xbfffffff] May 15 17:28:07.044596 kernel: clocksource: Switched to clocksource kvm-clock May 15 17:28:07.044605 kernel: VFS: Disk quotas dquot_6.6.0 May 15 17:28:07.044614 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 15 17:28:07.044622 kernel: pnp: PnP ACPI init May 15 17:28:07.044717 kernel: pnp 00:03: [dma 2] May 15 17:28:07.044732 kernel: pnp: PnP ACPI: found 5 devices May 15 17:28:07.044741 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 15 17:28:07.044750 kernel: NET: Registered PF_INET protocol family May 15 17:28:07.044759 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 15 17:28:07.044768 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 15 17:28:07.044777 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 15 17:28:07.044786 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 15 17:28:07.044797 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 15 17:28:07.044806 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 15 17:28:07.044815 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 15 17:28:07.044824 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 15 17:28:07.044833 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 15 17:28:07.044842 kernel: NET: Registered PF_XDP protocol family May 15 17:28:07.044925 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 15 17:28:07.045006 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 15 17:28:07.045087 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 15 17:28:07.045196 kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfffff window] May 15 17:28:07.045277 kernel: pci_bus 0000:00: resource 8 [mem 0xc000000000-0xc07fffffff window] May 15 17:28:07.045370 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release May 15 17:28:07.045463 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers May 15 17:28:07.045553 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds May 15 17:28:07.045566 kernel: PCI: CLS 0 bytes, default 64 May 15 17:28:07.045575 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) May 15 17:28:07.045584 kernel: software IO TLB: mapped [mem 0x00000000bbfdd000-0x00000000bffdd000] (64MB) May 15 17:28:07.045597 kernel: Initialise system trusted keyrings May 15 17:28:07.045606 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 15 17:28:07.045615 kernel: Key type asymmetric registered May 15 17:28:07.045623 kernel: Asymmetric key parser 'x509' registered May 15 17:28:07.045632 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 15 17:28:07.045641 kernel: io scheduler mq-deadline registered May 15 17:28:07.045650 kernel: io scheduler kyber registered May 15 17:28:07.045659 kernel: io scheduler bfq registered May 15 17:28:07.045667 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 15 17:28:07.045679 kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 May 15 17:28:07.045688 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 May 15 17:28:07.045697 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 May 15 17:28:07.045705 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 May 15 17:28:07.045714 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 15 17:28:07.045723 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 15 17:28:07.045731 kernel: random: crng init done May 15 17:28:07.045740 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 15 17:28:07.045749 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 15 17:28:07.045760 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 15 17:28:07.045769 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 15 17:28:07.045859 kernel: rtc_cmos 00:04: RTC can wake from S4 May 15 17:28:07.045943 kernel: rtc_cmos 00:04: registered as rtc0 May 15 17:28:07.046024 kernel: rtc_cmos 00:04: setting system clock to 2025-05-15T17:28:06 UTC (1747330086) May 15 17:28:07.047218 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram May 15 17:28:07.047237 kernel: NET: Registered PF_INET6 protocol family May 15 17:28:07.047247 kernel: Segment Routing with IPv6 May 15 17:28:07.047260 kernel: In-situ OAM (IOAM) with IPv6 May 15 17:28:07.047269 kernel: NET: Registered PF_PACKET protocol family May 15 17:28:07.047278 kernel: Key type dns_resolver registered May 15 17:28:07.047287 kernel: IPI shorthand broadcast: enabled May 15 17:28:07.047296 kernel: sched_clock: Marking stable (843555148, 166005861)->(1078814737, -69253728) May 15 17:28:07.047305 kernel: registered taskstats version 1 May 15 17:28:07.047313 kernel: Loading compiled-in X.509 certificates May 15 17:28:07.047323 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.182-flatcar: 04007c306af6b7696d09b3c2eafc1297036fd28e' May 15 17:28:07.047331 kernel: Key type .fscrypt registered May 15 17:28:07.047342 kernel: Key type fscrypt-provisioning registered May 15 17:28:07.047351 kernel: ima: No TPM chip found, activating TPM-bypass! May 15 17:28:07.047359 kernel: ima: Allocated hash algorithm: sha1 May 15 17:28:07.047368 kernel: ima: No architecture policies found May 15 17:28:07.047377 kernel: clk: Disabling unused clocks May 15 17:28:07.047386 kernel: Freeing unused kernel image (initmem) memory: 47472K May 15 17:28:07.047395 kernel: Write protecting the kernel read-only data: 28672k May 15 17:28:07.047404 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 15 17:28:07.047414 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 15 17:28:07.047423 kernel: Run /init as init process May 15 17:28:07.047432 kernel: with arguments: May 15 17:28:07.047440 kernel: /init May 15 17:28:07.047449 kernel: with environment: May 15 17:28:07.047458 kernel: HOME=/ May 15 17:28:07.047466 kernel: TERM=linux May 15 17:28:07.047475 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 15 17:28:07.047487 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 15 17:28:07.047501 systemd[1]: Detected virtualization kvm. May 15 17:28:07.047511 systemd[1]: Detected architecture x86-64. May 15 17:28:07.047521 systemd[1]: Running in initrd. May 15 17:28:07.047530 systemd[1]: No hostname configured, using default hostname. May 15 17:28:07.047540 systemd[1]: Hostname set to . May 15 17:28:07.047550 systemd[1]: Initializing machine ID from VM UUID. May 15 17:28:07.047559 systemd[1]: Queued start job for default target initrd.target. May 15 17:28:07.047571 systemd[1]: Started systemd-ask-password-console.path. May 15 17:28:07.047580 systemd[1]: Reached target cryptsetup.target. May 15 17:28:07.047589 systemd[1]: Reached target paths.target. May 15 17:28:07.047600 systemd[1]: Reached target slices.target. May 15 17:28:07.047610 systemd[1]: Reached target swap.target. May 15 17:28:07.047618 systemd[1]: Reached target timers.target. May 15 17:28:07.047627 systemd[1]: Listening on iscsid.socket. May 15 17:28:07.047636 systemd[1]: Listening on iscsiuio.socket. May 15 17:28:07.047647 systemd[1]: Listening on systemd-journald-audit.socket. May 15 17:28:07.047663 systemd[1]: Listening on systemd-journald-dev-log.socket. May 15 17:28:07.047674 systemd[1]: Listening on systemd-journald.socket. May 15 17:28:07.047683 systemd[1]: Listening on systemd-networkd.socket. May 15 17:28:07.047693 systemd[1]: Listening on systemd-udevd-control.socket. May 15 17:28:07.047702 systemd[1]: Listening on systemd-udevd-kernel.socket. May 15 17:28:07.047712 systemd[1]: Reached target sockets.target. May 15 17:28:07.047722 systemd[1]: Starting kmod-static-nodes.service... May 15 17:28:07.047731 systemd[1]: Finished network-cleanup.service. May 15 17:28:07.047740 systemd[1]: Starting systemd-fsck-usr.service... May 15 17:28:07.047749 systemd[1]: Starting systemd-journald.service... May 15 17:28:07.047758 systemd[1]: Starting systemd-modules-load.service... May 15 17:28:07.047767 systemd[1]: Starting systemd-resolved.service... May 15 17:28:07.047776 systemd[1]: Starting systemd-vconsole-setup.service... May 15 17:28:07.047785 systemd[1]: Finished kmod-static-nodes.service. May 15 17:28:07.047796 systemd[1]: Finished systemd-fsck-usr.service. May 15 17:28:07.047810 systemd-journald[186]: Journal started May 15 17:28:07.047858 systemd-journald[186]: Runtime Journal (/run/log/journal/b3e63b15b486477f9a539709de3d70c9) is 8.0M, max 78.4M, 70.4M free. May 15 17:28:07.034495 systemd-modules-load[187]: Inserted module 'overlay' May 15 17:28:07.083577 systemd[1]: Started systemd-journald.service. May 15 17:28:07.083603 kernel: audit: type=1130 audit(1747330087.062:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:07.083618 kernel: audit: type=1130 audit(1747330087.073:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:07.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:07.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:07.044678 systemd-resolved[188]: Positive Trust Anchors: May 15 17:28:07.092533 kernel: audit: type=1130 audit(1747330087.084:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:07.092570 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 15 17:28:07.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:07.044690 systemd-resolved[188]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 15 17:28:07.098580 kernel: audit: type=1130 audit(1747330087.092:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:07.092000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:07.044728 systemd-resolved[188]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 15 17:28:07.102811 kernel: Bridge firewalling registered May 15 17:28:07.048654 systemd-resolved[188]: Defaulting to hostname 'linux'. May 15 17:28:07.073335 systemd[1]: Started systemd-resolved.service. May 15 17:28:07.084385 systemd[1]: Finished systemd-vconsole-setup.service. May 15 17:28:07.093055 systemd[1]: Reached target nss-lookup.target. May 15 17:28:07.099933 systemd[1]: Starting dracut-cmdline-ask.service... May 15 17:28:07.100427 systemd-modules-load[187]: Inserted module 'br_netfilter' May 15 17:28:07.103941 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 15 17:28:07.111461 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 15 17:28:07.121198 kernel: audit: type=1130 audit(1747330087.115:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:07.115000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:07.123505 systemd[1]: Finished dracut-cmdline-ask.service. May 15 17:28:07.129594 kernel: audit: type=1130 audit(1747330087.123:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:07.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:07.130298 systemd[1]: Starting dracut-cmdline.service... May 15 17:28:07.140984 dracut-cmdline[203]: dracut-dracut-053 May 15 17:28:07.143130 kernel: SCSI subsystem initialized May 15 17:28:07.143720 dracut-cmdline[203]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=f8c1bc5ff10765e781843bfc97fc5357002a3f8a120201a0e954fce1d2ba48f0 May 15 17:28:07.159547 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 15 17:28:07.159590 kernel: device-mapper: uevent: version 1.0.3 May 15 17:28:07.163132 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 15 17:28:07.167811 systemd-modules-load[187]: Inserted module 'dm_multipath' May 15 17:28:07.169000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:07.169369 systemd[1]: Finished systemd-modules-load.service. May 15 17:28:07.176533 kernel: audit: type=1130 audit(1747330087.169:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:07.170683 systemd[1]: Starting systemd-sysctl.service... May 15 17:28:07.183631 systemd[1]: Finished systemd-sysctl.service. May 15 17:28:07.192913 kernel: audit: type=1130 audit(1747330087.184:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:07.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:07.234145 kernel: Loading iSCSI transport class v2.0-870. May 15 17:28:07.258181 kernel: iscsi: registered transport (tcp) May 15 17:28:07.286498 kernel: iscsi: registered transport (qla4xxx) May 15 17:28:07.286648 kernel: QLogic iSCSI HBA Driver May 15 17:28:07.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:07.344241 systemd[1]: Finished dracut-cmdline.service. May 15 17:28:07.351488 kernel: audit: type=1130 audit(1747330087.345:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:07.347711 systemd[1]: Starting dracut-pre-udev.service... May 15 17:28:07.420203 kernel: raid6: sse2x4 gen() 12268 MB/s May 15 17:28:07.438194 kernel: raid6: sse2x4 xor() 4913 MB/s May 15 17:28:07.456188 kernel: raid6: sse2x2 gen() 13508 MB/s May 15 17:28:07.474190 kernel: raid6: sse2x2 xor() 8323 MB/s May 15 17:28:07.492191 kernel: raid6: sse2x1 gen() 10523 MB/s May 15 17:28:07.510693 kernel: raid6: sse2x1 xor() 6630 MB/s May 15 17:28:07.510762 kernel: raid6: using algorithm sse2x2 gen() 13508 MB/s May 15 17:28:07.510790 kernel: raid6: .... xor() 8323 MB/s, rmw enabled May 15 17:28:07.515759 kernel: raid6: using ssse3x2 recovery algorithm May 15 17:28:07.532740 kernel: xor: measuring software checksum speed May 15 17:28:07.532810 kernel: prefetch64-sse : 17062 MB/sec May 15 17:28:07.534064 kernel: generic_sse : 15520 MB/sec May 15 17:28:07.534177 kernel: xor: using function: prefetch64-sse (17062 MB/sec) May 15 17:28:07.658177 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 15 17:28:07.673014 systemd[1]: Finished dracut-pre-udev.service. May 15 17:28:07.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:07.674000 audit: BPF prog-id=7 op=LOAD May 15 17:28:07.674000 audit: BPF prog-id=8 op=LOAD May 15 17:28:07.675954 systemd[1]: Starting systemd-udevd.service... May 15 17:28:07.689949 systemd-udevd[385]: Using default interface naming scheme 'v252'. May 15 17:28:07.694490 systemd[1]: Started systemd-udevd.service. May 15 17:28:07.699000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:07.702285 systemd[1]: Starting dracut-pre-trigger.service... May 15 17:28:07.721933 dracut-pre-trigger[406]: rd.md=0: removing MD RAID activation May 15 17:28:07.768870 systemd[1]: Finished dracut-pre-trigger.service. May 15 17:28:07.769000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:07.770345 systemd[1]: Starting systemd-udev-trigger.service... May 15 17:28:07.830000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:07.829746 systemd[1]: Finished systemd-udev-trigger.service. May 15 17:28:07.888140 kernel: virtio_blk virtio2: [vda] 20971520 512-byte logical blocks (10.7 GB/10.0 GiB) May 15 17:28:07.920781 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 15 17:28:07.920810 kernel: GPT:17805311 != 20971519 May 15 17:28:07.920827 kernel: GPT:Alternate GPT header not at the end of the disk. May 15 17:28:07.920842 kernel: GPT:17805311 != 20971519 May 15 17:28:07.920858 kernel: GPT: Use GNU Parted to correct GPT errors. May 15 17:28:07.920886 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 17:28:07.920909 kernel: libata version 3.00 loaded. May 15 17:28:07.920926 kernel: ata_piix 0000:00:01.1: version 2.13 May 15 17:28:07.936657 kernel: scsi host0: ata_piix May 15 17:28:07.936825 kernel: scsi host1: ata_piix May 15 17:28:07.936979 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc120 irq 14 May 15 17:28:07.937005 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc128 irq 15 May 15 17:28:07.953130 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (450) May 15 17:28:07.957519 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 15 17:28:08.000650 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 15 17:28:08.001200 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 15 17:28:08.008699 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 15 17:28:08.012705 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 15 17:28:08.014066 systemd[1]: Starting disk-uuid.service... May 15 17:28:08.034125 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 17:28:08.034210 disk-uuid[470]: Primary Header is updated. May 15 17:28:08.034210 disk-uuid[470]: Secondary Entries is updated. May 15 17:28:08.034210 disk-uuid[470]: Secondary Header is updated. May 15 17:28:08.040131 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 17:28:09.134158 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 17:28:09.134250 disk-uuid[471]: The operation has completed successfully. May 15 17:28:09.609757 systemd[1]: disk-uuid.service: Deactivated successfully. May 15 17:28:09.610001 systemd[1]: Finished disk-uuid.service. May 15 17:28:09.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:09.611000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:09.622015 systemd[1]: Starting verity-setup.service... May 15 17:28:09.662184 kernel: device-mapper: verity: sha256 using implementation "sha256-ssse3" May 15 17:28:09.768379 systemd[1]: Found device dev-mapper-usr.device. May 15 17:28:09.772589 systemd[1]: Mounting sysusr-usr.mount... May 15 17:28:09.779651 systemd[1]: Finished verity-setup.service. May 15 17:28:09.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:09.918172 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 15 17:28:09.918084 systemd[1]: Mounted sysusr-usr.mount. May 15 17:28:09.918829 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 15 17:28:09.919668 systemd[1]: Starting ignition-setup.service... May 15 17:28:09.920735 systemd[1]: Starting parse-ip-for-networkd.service... May 15 17:28:09.949470 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 15 17:28:09.949582 kernel: BTRFS info (device vda6): using free space tree May 15 17:28:09.949609 kernel: BTRFS info (device vda6): has skinny extents May 15 17:28:09.972204 systemd[1]: mnt-oem.mount: Deactivated successfully. May 15 17:28:09.987050 systemd[1]: Finished ignition-setup.service. May 15 17:28:09.988619 systemd[1]: Starting ignition-fetch-offline.service... May 15 17:28:09.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:10.026442 systemd[1]: Finished parse-ip-for-networkd.service. May 15 17:28:10.027000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:10.028000 audit: BPF prog-id=9 op=LOAD May 15 17:28:10.029295 systemd[1]: Starting systemd-networkd.service... May 15 17:28:10.058624 systemd-networkd[642]: lo: Link UP May 15 17:28:10.058636 systemd-networkd[642]: lo: Gained carrier May 15 17:28:10.059912 systemd-networkd[642]: Enumeration completed May 15 17:28:10.060356 systemd-networkd[642]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 15 17:28:10.061672 systemd[1]: Started systemd-networkd.service. May 15 17:28:10.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:10.062282 systemd-networkd[642]: eth0: Link UP May 15 17:28:10.062286 systemd-networkd[642]: eth0: Gained carrier May 15 17:28:10.062884 systemd[1]: Reached target network.target. May 15 17:28:10.067014 systemd[1]: Starting iscsiuio.service... May 15 17:28:10.073260 systemd-networkd[642]: eth0: DHCPv4 address 172.24.4.218/24, gateway 172.24.4.1 acquired from 172.24.4.1 May 15 17:28:10.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:10.075084 systemd[1]: Started iscsiuio.service. May 15 17:28:10.076583 systemd[1]: Starting iscsid.service... May 15 17:28:10.079854 iscsid[647]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 15 17:28:10.079854 iscsid[647]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 15 17:28:10.079854 iscsid[647]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 15 17:28:10.079854 iscsid[647]: If using hardware iscsi like qla4xxx this message can be ignored. May 15 17:28:10.079854 iscsid[647]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 15 17:28:10.079854 iscsid[647]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 15 17:28:10.083000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:10.082289 systemd[1]: Started iscsid.service. May 15 17:28:10.085580 systemd[1]: Starting dracut-initqueue.service... May 15 17:28:10.098644 systemd[1]: Finished dracut-initqueue.service. May 15 17:28:10.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:10.099429 systemd[1]: Reached target remote-fs-pre.target. May 15 17:28:10.100416 systemd[1]: Reached target remote-cryptsetup.target. May 15 17:28:10.102171 systemd[1]: Reached target remote-fs.target. May 15 17:28:10.104843 systemd[1]: Starting dracut-pre-mount.service... May 15 17:28:10.114450 systemd[1]: Finished dracut-pre-mount.service. May 15 17:28:10.115000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:10.317752 ignition[612]: Ignition 2.14.0 May 15 17:28:10.317781 ignition[612]: Stage: fetch-offline May 15 17:28:10.317895 ignition[612]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 15 17:28:10.317982 ignition[612]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 15 17:28:10.321260 ignition[612]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 15 17:28:10.321580 ignition[612]: parsed url from cmdline: "" May 15 17:28:10.321592 ignition[612]: no config URL provided May 15 17:28:10.321610 ignition[612]: reading system config file "/usr/lib/ignition/user.ign" May 15 17:28:10.326045 systemd[1]: Finished ignition-fetch-offline.service. May 15 17:28:10.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:10.321635 ignition[612]: no config at "/usr/lib/ignition/user.ign" May 15 17:28:10.321651 ignition[612]: failed to fetch config: resource requires networking May 15 17:28:10.331571 systemd[1]: Starting ignition-fetch.service... May 15 17:28:10.322775 ignition[612]: Ignition finished successfully May 15 17:28:10.356608 ignition[665]: Ignition 2.14.0 May 15 17:28:10.358449 ignition[665]: Stage: fetch May 15 17:28:10.360054 ignition[665]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 15 17:28:10.361912 ignition[665]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 15 17:28:10.366156 ignition[665]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 15 17:28:10.368248 ignition[665]: parsed url from cmdline: "" May 15 17:28:10.368381 ignition[665]: no config URL provided May 15 17:28:10.369639 ignition[665]: reading system config file "/usr/lib/ignition/user.ign" May 15 17:28:10.371309 ignition[665]: no config at "/usr/lib/ignition/user.ign" May 15 17:28:10.377655 ignition[665]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... May 15 17:28:10.377709 ignition[665]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... May 15 17:28:10.379553 ignition[665]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 May 15 17:28:10.666344 ignition[665]: GET result: OK May 15 17:28:10.666475 ignition[665]: parsing config with SHA512: dace7ed8534843fc233843660275108b7690e0e0844f11e00dd26948515bb4a46a853d444715f39d8403359b0905f576dfd236bbe0fcfe2543dd7833896fd1cd May 15 17:28:10.679343 unknown[665]: fetched base config from "system" May 15 17:28:10.679376 unknown[665]: fetched base config from "system" May 15 17:28:10.680084 ignition[665]: fetch: fetch complete May 15 17:28:10.679392 unknown[665]: fetched user config from "openstack" May 15 17:28:10.684000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:10.680097 ignition[665]: fetch: fetch passed May 15 17:28:10.683195 systemd[1]: Finished ignition-fetch.service. May 15 17:28:10.680247 ignition[665]: Ignition finished successfully May 15 17:28:10.686372 systemd[1]: Starting ignition-kargs.service... May 15 17:28:10.708291 ignition[671]: Ignition 2.14.0 May 15 17:28:10.708357 ignition[671]: Stage: kargs May 15 17:28:10.708799 ignition[671]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 15 17:28:10.708891 ignition[671]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 15 17:28:10.712435 ignition[671]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 15 17:28:10.714506 ignition[671]: kargs: kargs passed May 15 17:28:10.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:10.716368 systemd[1]: Finished ignition-kargs.service. May 15 17:28:10.714635 ignition[671]: Ignition finished successfully May 15 17:28:10.719471 systemd[1]: Starting ignition-disks.service... May 15 17:28:10.736721 ignition[677]: Ignition 2.14.0 May 15 17:28:10.736749 ignition[677]: Stage: disks May 15 17:28:10.736994 ignition[677]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 15 17:28:10.737040 ignition[677]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 15 17:28:10.739409 ignition[677]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 15 17:28:10.741527 ignition[677]: disks: disks passed May 15 17:28:10.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:10.743958 systemd[1]: Finished ignition-disks.service. May 15 17:28:10.741620 ignition[677]: Ignition finished successfully May 15 17:28:10.746005 systemd[1]: Reached target initrd-root-device.target. May 15 17:28:10.747219 systemd[1]: Reached target local-fs-pre.target. May 15 17:28:10.748473 systemd[1]: Reached target local-fs.target. May 15 17:28:10.750890 systemd[1]: Reached target sysinit.target. May 15 17:28:10.753225 systemd[1]: Reached target basic.target. May 15 17:28:10.757471 systemd[1]: Starting systemd-fsck-root.service... May 15 17:28:10.790719 systemd-fsck[685]: ROOT: clean, 623/1628000 files, 124060/1617920 blocks May 15 17:28:10.803000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:10.801920 systemd[1]: Finished systemd-fsck-root.service. May 15 17:28:10.804893 systemd[1]: Mounting sysroot.mount... May 15 17:28:10.830159 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 15 17:28:10.831582 systemd[1]: Mounted sysroot.mount. May 15 17:28:10.834224 systemd[1]: Reached target initrd-root-fs.target. May 15 17:28:10.838956 systemd[1]: Mounting sysroot-usr.mount... May 15 17:28:10.840968 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 15 17:28:10.842512 systemd[1]: Starting flatcar-openstack-hostname.service... May 15 17:28:10.850581 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 15 17:28:10.850898 systemd[1]: Reached target ignition-diskful.target. May 15 17:28:10.858567 systemd[1]: Mounted sysroot-usr.mount. May 15 17:28:10.866859 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 15 17:28:10.869693 systemd[1]: Starting initrd-setup-root.service... May 15 17:28:10.885893 initrd-setup-root[697]: cut: /sysroot/etc/passwd: No such file or directory May 15 17:28:10.902158 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (692) May 15 17:28:10.908591 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 15 17:28:10.908689 kernel: BTRFS info (device vda6): using free space tree May 15 17:28:10.908718 kernel: BTRFS info (device vda6): has skinny extents May 15 17:28:10.910942 initrd-setup-root[705]: cut: /sysroot/etc/group: No such file or directory May 15 17:28:10.917261 initrd-setup-root[729]: cut: /sysroot/etc/shadow: No such file or directory May 15 17:28:10.923190 initrd-setup-root[737]: cut: /sysroot/etc/gshadow: No such file or directory May 15 17:28:10.930191 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 15 17:28:11.009280 systemd[1]: Finished initrd-setup-root.service. May 15 17:28:11.017628 kernel: kauditd_printk_skb: 22 callbacks suppressed May 15 17:28:11.017673 kernel: audit: type=1130 audit(1747330091.009:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:11.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:11.010782 systemd[1]: Starting ignition-mount.service... May 15 17:28:11.018328 systemd[1]: Starting sysroot-boot.service... May 15 17:28:11.025649 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. May 15 17:28:11.025764 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. May 15 17:28:11.053276 ignition[759]: INFO : Ignition 2.14.0 May 15 17:28:11.054067 ignition[759]: INFO : Stage: mount May 15 17:28:11.056000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:11.056331 systemd[1]: Finished sysroot-boot.service. May 15 17:28:11.062208 kernel: audit: type=1130 audit(1747330091.056:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:11.063141 ignition[759]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 15 17:28:11.063141 ignition[759]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 15 17:28:11.066128 ignition[759]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 15 17:28:11.067534 ignition[759]: INFO : mount: mount passed May 15 17:28:11.067534 ignition[759]: INFO : Ignition finished successfully May 15 17:28:11.069731 systemd[1]: Finished ignition-mount.service. May 15 17:28:11.070000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:11.075746 coreos-metadata[691]: May 15 17:28:11.075 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 May 15 17:28:11.076813 kernel: audit: type=1130 audit(1747330091.070:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:11.091086 coreos-metadata[691]: May 15 17:28:11.091 INFO Fetch successful May 15 17:28:11.091086 coreos-metadata[691]: May 15 17:28:11.091 INFO wrote hostname ci-3510-3-100-77fbd20122.novalocal to /sysroot/etc/hostname May 15 17:28:11.095141 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. May 15 17:28:11.095252 systemd[1]: Finished flatcar-openstack-hostname.service. May 15 17:28:11.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:11.097471 systemd[1]: Starting ignition-files.service... May 15 17:28:11.107153 kernel: audit: type=1130 audit(1747330091.096:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:11.107182 kernel: audit: type=1131 audit(1747330091.096:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:11.096000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:11.110797 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 15 17:28:11.122134 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/vda6 scanned by mount (768) May 15 17:28:11.127169 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 15 17:28:11.127255 kernel: BTRFS info (device vda6): using free space tree May 15 17:28:11.127277 kernel: BTRFS info (device vda6): has skinny extents May 15 17:28:11.137517 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 15 17:28:11.150726 ignition[787]: INFO : Ignition 2.14.0 May 15 17:28:11.150726 ignition[787]: INFO : Stage: files May 15 17:28:11.152911 ignition[787]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 15 17:28:11.152911 ignition[787]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 15 17:28:11.152911 ignition[787]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 15 17:28:11.159080 ignition[787]: DEBUG : files: compiled without relabeling support, skipping May 15 17:28:11.159080 ignition[787]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 15 17:28:11.159080 ignition[787]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 15 17:28:11.163770 ignition[787]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 15 17:28:11.163770 ignition[787]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 15 17:28:11.163770 ignition[787]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 15 17:28:11.163293 unknown[787]: wrote ssh authorized keys file for user: core May 15 17:28:11.169379 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" May 15 17:28:11.169379 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" May 15 17:28:11.169379 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" May 15 17:28:11.169379 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 15 17:28:11.169379 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 15 17:28:11.169379 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 15 17:28:11.169379 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 15 17:28:11.169379 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.31.0-x86-64.raw: attempt #1 May 15 17:28:11.939708 systemd-networkd[642]: eth0: Gained IPv6LL May 15 17:28:11.977096 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK May 15 17:28:13.571919 ignition[787]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 15 17:28:13.571919 ignition[787]: INFO : files: op(7): [started] processing unit "coreos-metadata-sshkeys@.service" May 15 17:28:13.571919 ignition[787]: INFO : files: op(7): [finished] processing unit "coreos-metadata-sshkeys@.service" May 15 17:28:13.571919 ignition[787]: INFO : files: op(8): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 15 17:28:13.579147 ignition[787]: INFO : files: op(8): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 15 17:28:13.582685 ignition[787]: INFO : files: createResultFile: createFiles: op(9): [started] writing file "/sysroot/etc/.ignition-result.json" May 15 17:28:13.583741 ignition[787]: INFO : files: createResultFile: createFiles: op(9): [finished] writing file "/sysroot/etc/.ignition-result.json" May 15 17:28:13.584594 ignition[787]: INFO : files: files passed May 15 17:28:13.585138 ignition[787]: INFO : Ignition finished successfully May 15 17:28:13.587913 systemd[1]: Finished ignition-files.service. May 15 17:28:13.589000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:13.595129 kernel: audit: type=1130 audit(1747330093.589:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:13.596289 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 15 17:28:13.597567 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 15 17:28:13.601500 systemd[1]: Starting ignition-quench.service... May 15 17:28:13.620063 systemd[1]: ignition-quench.service: Deactivated successfully. May 15 17:28:13.620352 systemd[1]: Finished ignition-quench.service. May 15 17:28:13.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:13.624703 initrd-setup-root-after-ignition[812]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 15 17:28:13.643695 kernel: audit: type=1130 audit(1747330093.621:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:13.643765 kernel: audit: type=1131 audit(1747330093.622:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:13.622000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:13.632487 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 15 17:28:13.658233 kernel: audit: type=1130 audit(1747330093.644:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:13.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:13.644995 systemd[1]: Reached target ignition-complete.target. May 15 17:28:13.660594 systemd[1]: Starting initrd-parse-etc.service... May 15 17:28:13.691013 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 15 17:28:13.691235 systemd[1]: Finished initrd-parse-etc.service. May 15 17:28:13.705695 kernel: audit: type=1130 audit(1747330093.693:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:13.693000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:13.693000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:13.693787 systemd[1]: Reached target initrd-fs.target. May 15 17:28:13.706587 systemd[1]: Reached target initrd.target. May 15 17:28:13.708810 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 15 17:28:13.710419 systemd[1]: Starting dracut-pre-pivot.service... May 15 17:28:13.733321 systemd[1]: Finished dracut-pre-pivot.service. May 15 17:28:13.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:13.736426 systemd[1]: Starting initrd-cleanup.service... May 15 17:28:13.757732 systemd[1]: Stopped target nss-lookup.target. May 15 17:28:13.760489 systemd[1]: Stopped target remote-cryptsetup.target. May 15 17:28:13.763649 systemd[1]: Stopped target timers.target. May 15 17:28:13.765151 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 15 17:28:13.767000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:13.765449 systemd[1]: Stopped dracut-pre-pivot.service. May 15 17:28:13.767801 systemd[1]: Stopped target initrd.target. May 15 17:28:13.770179 systemd[1]: Stopped target basic.target. May 15 17:28:13.772608 systemd[1]: Stopped target ignition-complete.target. May 15 17:28:13.775072 systemd[1]: Stopped target ignition-diskful.target. May 15 17:28:13.777512 systemd[1]: Stopped target initrd-root-device.target. May 15 17:28:13.780241 systemd[1]: Stopped target remote-fs.target. May 15 17:28:13.782701 systemd[1]: Stopped target remote-fs-pre.target. May 15 17:28:13.785216 systemd[1]: Stopped target sysinit.target. May 15 17:28:13.787639 systemd[1]: Stopped target local-fs.target. May 15 17:28:13.790156 systemd[1]: Stopped target local-fs-pre.target. May 15 17:28:13.792600 systemd[1]: Stopped target swap.target. May 15 17:28:13.797000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:13.794923 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 15 17:28:13.795220 systemd[1]: Stopped dracut-pre-mount.service. May 15 17:28:13.802000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:13.797667 systemd[1]: Stopped target cryptsetup.target. May 15 17:28:13.805000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:13.799963 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 15 17:28:13.807000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:13.800259 systemd[1]: Stopped dracut-initqueue.service. May 15 17:28:13.802745 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 15 17:28:13.803025 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 15 17:28:13.816000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:13.818000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:13.805246 systemd[1]: ignition-files.service: Deactivated successfully. May 15 17:28:13.805504 systemd[1]: Stopped ignition-files.service. May 15 17:28:13.809572 systemd[1]: Stopping ignition-mount.service... May 15 17:28:13.834000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:13.834000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:13.813070 systemd[1]: Stopping sysroot-boot.service... May 15 17:28:13.814955 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 15 17:28:13.815304 systemd[1]: Stopped systemd-udev-trigger.service. May 15 17:28:13.816756 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 15 17:28:13.817002 systemd[1]: Stopped dracut-pre-trigger.service. May 15 17:28:13.829653 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 15 17:28:13.829858 systemd[1]: Finished initrd-cleanup.service. May 15 17:28:13.846119 ignition[825]: INFO : Ignition 2.14.0 May 15 17:28:13.846119 ignition[825]: INFO : Stage: umount May 15 17:28:13.846119 ignition[825]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 15 17:28:13.846119 ignition[825]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 15 17:28:13.851145 ignition[825]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 15 17:28:13.851145 ignition[825]: INFO : umount: umount passed May 15 17:28:13.851145 ignition[825]: INFO : Ignition finished successfully May 15 17:28:13.852000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:13.853000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:13.851436 systemd[1]: ignition-mount.service: Deactivated successfully. May 15 17:28:13.854000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:13.851538 systemd[1]: Stopped ignition-mount.service. May 15 17:28:13.855000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:13.852508 systemd[1]: ignition-disks.service: Deactivated successfully. May 15 17:28:13.856000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:13.852555 systemd[1]: Stopped ignition-disks.service. May 15 17:28:13.853391 systemd[1]: ignition-kargs.service: Deactivated successfully. May 15 17:28:13.853431 systemd[1]: Stopped ignition-kargs.service. May 15 17:28:13.854316 systemd[1]: ignition-fetch.service: Deactivated successfully. May 15 17:28:13.854351 systemd[1]: Stopped ignition-fetch.service. May 15 17:28:13.855278 systemd[1]: Stopped target network.target. May 15 17:28:13.856179 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 15 17:28:13.856218 systemd[1]: Stopped ignition-fetch-offline.service. May 15 17:28:13.865000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:13.856689 systemd[1]: Stopped target paths.target. May 15 17:28:13.857094 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 15 17:28:13.859212 systemd[1]: Stopped systemd-ask-password-console.path. May 15 17:28:13.859984 systemd[1]: Stopped target slices.target. May 15 17:28:13.861798 systemd[1]: Stopped target sockets.target. May 15 17:28:13.862863 systemd[1]: iscsid.socket: Deactivated successfully. May 15 17:28:13.875000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:13.862891 systemd[1]: Closed iscsid.socket. May 15 17:28:13.863793 systemd[1]: iscsiuio.socket: Deactivated successfully. May 15 17:28:13.877000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:13.863819 systemd[1]: Closed iscsiuio.socket. May 15 17:28:13.864690 systemd[1]: ignition-setup.service: Deactivated successfully. May 15 17:28:13.864729 systemd[1]: Stopped ignition-setup.service. May 15 17:28:13.865983 systemd[1]: Stopping systemd-networkd.service... May 15 17:28:13.866997 systemd[1]: Stopping systemd-resolved.service... May 15 17:28:13.881000 audit: BPF prog-id=6 op=UNLOAD May 15 17:28:13.868953 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 15 17:28:13.869141 systemd-networkd[642]: eth0: DHCPv6 lease lost May 15 17:28:13.882000 audit: BPF prog-id=9 op=UNLOAD May 15 17:28:13.883000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:13.873414 systemd[1]: systemd-networkd.service: Deactivated successfully. May 15 17:28:13.884000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:13.873511 systemd[1]: Stopped systemd-networkd.service. May 15 17:28:13.885000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:13.876452 systemd[1]: systemd-resolved.service: Deactivated successfully. May 15 17:28:13.876544 systemd[1]: Stopped systemd-resolved.service. May 15 17:28:13.878204 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 15 17:28:13.878236 systemd[1]: Closed systemd-networkd.socket. May 15 17:28:13.880006 systemd[1]: Stopping network-cleanup.service... May 15 17:28:13.882323 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 15 17:28:13.882375 systemd[1]: Stopped parse-ip-for-networkd.service. May 15 17:28:13.883435 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 15 17:28:13.898000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:13.883476 systemd[1]: Stopped systemd-sysctl.service. May 15 17:28:13.899000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:13.884633 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 15 17:28:13.884673 systemd[1]: Stopped systemd-modules-load.service. May 15 17:28:13.885498 systemd[1]: Stopping systemd-udevd.service... May 15 17:28:13.903000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:13.893519 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 15 17:28:13.904000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:13.896020 systemd[1]: network-cleanup.service: Deactivated successfully. May 15 17:28:13.905000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:13.896147 systemd[1]: Stopped network-cleanup.service. May 15 17:28:13.899061 systemd[1]: systemd-udevd.service: Deactivated successfully. May 15 17:28:13.899254 systemd[1]: Stopped systemd-udevd.service. May 15 17:28:13.900310 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 15 17:28:13.900348 systemd[1]: Closed systemd-udevd-control.socket. May 15 17:28:13.901046 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 15 17:28:13.901085 systemd[1]: Closed systemd-udevd-kernel.socket. May 15 17:28:13.902204 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 15 17:28:13.913000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:13.902243 systemd[1]: Stopped dracut-pre-udev.service. May 15 17:28:13.914000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:13.903261 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 15 17:28:13.915000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:13.903297 systemd[1]: Stopped dracut-cmdline.service. May 15 17:28:13.904187 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 15 17:28:13.904226 systemd[1]: Stopped dracut-cmdline-ask.service. May 15 17:28:13.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:13.918000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:13.906073 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 15 17:28:13.906866 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. May 15 17:28:13.906917 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. May 15 17:28:13.914228 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 15 17:28:13.914293 systemd[1]: Stopped kmod-static-nodes.service. May 15 17:28:13.914973 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 15 17:28:13.915013 systemd[1]: Stopped systemd-vconsole-setup.service. May 15 17:28:13.916957 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. May 15 17:28:13.917478 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 15 17:28:13.917577 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 15 17:28:14.118865 systemd[1]: sysroot-boot.service: Deactivated successfully. May 15 17:28:14.119097 systemd[1]: Stopped sysroot-boot.service. May 15 17:28:14.121000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:14.121992 systemd[1]: Reached target initrd-switch-root.target. May 15 17:28:14.124146 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 15 17:28:14.126000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:14.124265 systemd[1]: Stopped initrd-setup-root.service. May 15 17:28:14.128291 systemd[1]: Starting initrd-switch-root.service... May 15 17:28:14.171517 systemd[1]: Switching root. May 15 17:28:14.201017 iscsid[647]: iscsid shutting down. May 15 17:28:14.203859 systemd-journald[186]: Received SIGTERM from PID 1 (n/a). May 15 17:28:14.203980 systemd-journald[186]: Journal stopped May 15 17:28:20.334962 kernel: SELinux: Class mctp_socket not defined in policy. May 15 17:28:20.335019 kernel: SELinux: Class anon_inode not defined in policy. May 15 17:28:20.335032 kernel: SELinux: the above unknown classes and permissions will be allowed May 15 17:28:20.335046 kernel: SELinux: policy capability network_peer_controls=1 May 15 17:28:20.335057 kernel: SELinux: policy capability open_perms=1 May 15 17:28:20.335068 kernel: SELinux: policy capability extended_socket_class=1 May 15 17:28:20.335079 kernel: SELinux: policy capability always_check_network=0 May 15 17:28:20.335093 kernel: SELinux: policy capability cgroup_seclabel=1 May 15 17:28:20.335119 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 15 17:28:20.335130 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 15 17:28:20.335140 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 15 17:28:20.335153 systemd[1]: Successfully loaded SELinux policy in 99.215ms. May 15 17:28:20.335174 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 41.638ms. May 15 17:28:20.335187 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 15 17:28:20.335200 systemd[1]: Detected virtualization kvm. May 15 17:28:20.335211 systemd[1]: Detected architecture x86-64. May 15 17:28:20.335222 systemd[1]: Detected first boot. May 15 17:28:20.335237 systemd[1]: Hostname set to . May 15 17:28:20.335249 systemd[1]: Initializing machine ID from VM UUID. May 15 17:28:20.335264 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 15 17:28:20.335278 systemd[1]: Populated /etc with preset unit settings. May 15 17:28:20.335291 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 17:28:20.335305 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 17:28:20.335318 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 17:28:20.335331 kernel: kauditd_printk_skb: 52 callbacks suppressed May 15 17:28:20.335344 kernel: audit: type=1334 audit(1747330100.072:88): prog-id=12 op=LOAD May 15 17:28:20.335356 kernel: audit: type=1334 audit(1747330100.072:89): prog-id=3 op=UNLOAD May 15 17:28:20.335367 kernel: audit: type=1334 audit(1747330100.075:90): prog-id=13 op=LOAD May 15 17:28:20.335378 kernel: audit: type=1334 audit(1747330100.079:91): prog-id=14 op=LOAD May 15 17:28:20.335390 kernel: audit: type=1334 audit(1747330100.079:92): prog-id=4 op=UNLOAD May 15 17:28:20.335401 kernel: audit: type=1334 audit(1747330100.079:93): prog-id=5 op=UNLOAD May 15 17:28:20.335412 kernel: audit: type=1334 audit(1747330100.083:94): prog-id=15 op=LOAD May 15 17:28:20.335423 kernel: audit: type=1334 audit(1747330100.083:95): prog-id=12 op=UNLOAD May 15 17:28:20.335434 kernel: audit: type=1334 audit(1747330100.091:96): prog-id=16 op=LOAD May 15 17:28:20.335449 kernel: audit: type=1334 audit(1747330100.095:97): prog-id=17 op=LOAD May 15 17:28:20.335461 systemd[1]: iscsiuio.service: Deactivated successfully. May 15 17:28:20.335473 systemd[1]: Stopped iscsiuio.service. May 15 17:28:20.335486 systemd[1]: iscsid.service: Deactivated successfully. May 15 17:28:20.336691 systemd[1]: Stopped iscsid.service. May 15 17:28:20.336712 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 15 17:28:20.336726 systemd[1]: Stopped initrd-switch-root.service. May 15 17:28:20.336742 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 15 17:28:20.336755 systemd[1]: Created slice system-addon\x2dconfig.slice. May 15 17:28:20.336771 systemd[1]: Created slice system-addon\x2drun.slice. May 15 17:28:20.336785 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. May 15 17:28:20.336800 systemd[1]: Created slice system-getty.slice. May 15 17:28:20.336814 systemd[1]: Created slice system-modprobe.slice. May 15 17:28:20.336827 systemd[1]: Created slice system-serial\x2dgetty.slice. May 15 17:28:20.336839 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 15 17:28:20.336851 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 15 17:28:20.336863 systemd[1]: Created slice user.slice. May 15 17:28:20.336876 systemd[1]: Started systemd-ask-password-console.path. May 15 17:28:20.336888 systemd[1]: Started systemd-ask-password-wall.path. May 15 17:28:20.336900 systemd[1]: Set up automount boot.automount. May 15 17:28:20.336912 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 15 17:28:20.336926 systemd[1]: Stopped target initrd-switch-root.target. May 15 17:28:20.336939 systemd[1]: Stopped target initrd-fs.target. May 15 17:28:20.336951 systemd[1]: Stopped target initrd-root-fs.target. May 15 17:28:20.336964 systemd[1]: Reached target integritysetup.target. May 15 17:28:20.336976 systemd[1]: Reached target remote-cryptsetup.target. May 15 17:28:20.336989 systemd[1]: Reached target remote-fs.target. May 15 17:28:20.337002 systemd[1]: Reached target slices.target. May 15 17:28:20.337017 systemd[1]: Reached target swap.target. May 15 17:28:20.337028 systemd[1]: Reached target torcx.target. May 15 17:28:20.337041 systemd[1]: Reached target veritysetup.target. May 15 17:28:20.337053 systemd[1]: Listening on systemd-coredump.socket. May 15 17:28:20.337064 systemd[1]: Listening on systemd-initctl.socket. May 15 17:28:20.337075 systemd[1]: Listening on systemd-networkd.socket. May 15 17:28:20.337086 systemd[1]: Listening on systemd-udevd-control.socket. May 15 17:28:20.337116 systemd[1]: Listening on systemd-udevd-kernel.socket. May 15 17:28:20.337129 systemd[1]: Listening on systemd-userdbd.socket. May 15 17:28:20.337141 systemd[1]: Mounting dev-hugepages.mount... May 15 17:28:20.337153 systemd[1]: Mounting dev-mqueue.mount... May 15 17:28:20.337164 systemd[1]: Mounting media.mount... May 15 17:28:20.337178 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 17:28:20.337190 systemd[1]: Mounting sys-kernel-debug.mount... May 15 17:28:20.337201 systemd[1]: Mounting sys-kernel-tracing.mount... May 15 17:28:20.337212 systemd[1]: Mounting tmp.mount... May 15 17:28:20.337224 systemd[1]: Starting flatcar-tmpfiles.service... May 15 17:28:20.337236 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 17:28:20.337248 systemd[1]: Starting kmod-static-nodes.service... May 15 17:28:20.337261 systemd[1]: Starting modprobe@configfs.service... May 15 17:28:20.337274 systemd[1]: Starting modprobe@dm_mod.service... May 15 17:28:20.338665 systemd[1]: Starting modprobe@drm.service... May 15 17:28:20.338682 systemd[1]: Starting modprobe@efi_pstore.service... May 15 17:28:20.338695 systemd[1]: Starting modprobe@fuse.service... May 15 17:28:20.338708 systemd[1]: Starting modprobe@loop.service... May 15 17:28:20.338721 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 15 17:28:20.338733 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 15 17:28:20.338746 systemd[1]: Stopped systemd-fsck-root.service. May 15 17:28:20.338758 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 15 17:28:20.338773 systemd[1]: Stopped systemd-fsck-usr.service. May 15 17:28:20.338785 kernel: loop: module loaded May 15 17:28:20.338797 systemd[1]: Stopped systemd-journald.service. May 15 17:28:20.338809 kernel: fuse: init (API version 7.34) May 15 17:28:20.338820 systemd[1]: Starting systemd-journald.service... May 15 17:28:20.338832 systemd[1]: Starting systemd-modules-load.service... May 15 17:28:20.338844 systemd[1]: Starting systemd-network-generator.service... May 15 17:28:20.338857 systemd[1]: Starting systemd-remount-fs.service... May 15 17:28:20.338869 systemd[1]: Starting systemd-udev-trigger.service... May 15 17:28:20.338883 systemd[1]: verity-setup.service: Deactivated successfully. May 15 17:28:20.338897 systemd[1]: Stopped verity-setup.service. May 15 17:28:20.344303 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 17:28:20.344323 systemd[1]: Mounted dev-hugepages.mount. May 15 17:28:20.344336 systemd[1]: Mounted dev-mqueue.mount. May 15 17:28:20.344349 systemd[1]: Mounted media.mount. May 15 17:28:20.344362 systemd[1]: Mounted sys-kernel-debug.mount. May 15 17:28:20.344374 systemd[1]: Mounted sys-kernel-tracing.mount. May 15 17:28:20.344386 systemd[1]: Mounted tmp.mount. May 15 17:28:20.344398 systemd[1]: Finished kmod-static-nodes.service. May 15 17:28:20.344415 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 15 17:28:20.344427 systemd[1]: Finished modprobe@configfs.service. May 15 17:28:20.344443 systemd-journald[931]: Journal started May 15 17:28:20.344496 systemd-journald[931]: Runtime Journal (/run/log/journal/b3e63b15b486477f9a539709de3d70c9) is 8.0M, max 78.4M, 70.4M free. May 15 17:28:14.763000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 15 17:28:14.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 15 17:28:14.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 15 17:28:14.976000 audit: BPF prog-id=10 op=LOAD May 15 17:28:14.976000 audit: BPF prog-id=10 op=UNLOAD May 15 17:28:14.976000 audit: BPF prog-id=11 op=LOAD May 15 17:28:14.976000 audit: BPF prog-id=11 op=UNLOAD May 15 17:28:15.137000 audit[858]: AVC avc: denied { associate } for pid=858 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 15 17:28:15.137000 audit[858]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d892 a1=c0000cede0 a2=c0000d7040 a3=32 items=0 ppid=841 pid=858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:28:15.137000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 15 17:28:15.140000 audit[858]: AVC avc: denied { associate } for pid=858 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 15 17:28:15.140000 audit[858]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d969 a2=1ed a3=0 items=2 ppid=841 pid=858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:28:15.140000 audit: CWD cwd="/" May 15 17:28:15.140000 audit: PATH item=0 name=(null) inode=2 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:15.140000 audit: PATH item=1 name=(null) inode=3 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:15.140000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 15 17:28:20.072000 audit: BPF prog-id=12 op=LOAD May 15 17:28:20.072000 audit: BPF prog-id=3 op=UNLOAD May 15 17:28:20.075000 audit: BPF prog-id=13 op=LOAD May 15 17:28:20.079000 audit: BPF prog-id=14 op=LOAD May 15 17:28:20.079000 audit: BPF prog-id=4 op=UNLOAD May 15 17:28:20.079000 audit: BPF prog-id=5 op=UNLOAD May 15 17:28:20.083000 audit: BPF prog-id=15 op=LOAD May 15 17:28:20.083000 audit: BPF prog-id=12 op=UNLOAD May 15 17:28:20.091000 audit: BPF prog-id=16 op=LOAD May 15 17:28:20.095000 audit: BPF prog-id=17 op=LOAD May 15 17:28:20.095000 audit: BPF prog-id=13 op=UNLOAD May 15 17:28:20.095000 audit: BPF prog-id=14 op=UNLOAD May 15 17:28:20.099000 audit: BPF prog-id=18 op=LOAD May 15 17:28:20.099000 audit: BPF prog-id=15 op=UNLOAD May 15 17:28:20.103000 audit: BPF prog-id=19 op=LOAD May 15 17:28:20.107000 audit: BPF prog-id=20 op=LOAD May 15 17:28:20.107000 audit: BPF prog-id=16 op=UNLOAD May 15 17:28:20.107000 audit: BPF prog-id=17 op=UNLOAD May 15 17:28:20.108000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:20.118000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:20.121000 audit: BPF prog-id=18 op=UNLOAD May 15 17:28:20.125000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:20.134000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:20.134000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:20.282000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:20.289000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:20.292000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:20.292000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:20.293000 audit: BPF prog-id=21 op=LOAD May 15 17:28:20.296000 audit: BPF prog-id=22 op=LOAD May 15 17:28:20.296000 audit: BPF prog-id=23 op=LOAD May 15 17:28:20.296000 audit: BPF prog-id=19 op=UNLOAD May 15 17:28:20.296000 audit: BPF prog-id=20 op=UNLOAD May 15 17:28:20.319000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:20.330000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 15 17:28:20.330000 audit[931]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7ffc602ded70 a2=4000 a3=7ffc602dee0c items=0 ppid=1 pid=931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:28:20.330000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 15 17:28:20.342000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:20.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:20.346000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:15.134604 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T17:28:15Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 17:28:20.070714 systemd[1]: Queued start job for default target multi-user.target. May 15 17:28:15.135555 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T17:28:15Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 15 17:28:20.070726 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 15 17:28:15.135580 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T17:28:15Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 15 17:28:20.107920 systemd[1]: systemd-journald.service: Deactivated successfully. May 15 17:28:15.135621 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T17:28:15Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 15 17:28:20.350324 systemd[1]: Started systemd-journald.service. May 15 17:28:20.347000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:20.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:20.348000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:15.135634 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T17:28:15Z" level=debug msg="skipped missing lower profile" missing profile=oem May 15 17:28:20.348271 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 17:28:15.135671 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T17:28:15Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 15 17:28:20.348380 systemd[1]: Finished modprobe@dm_mod.service. May 15 17:28:15.135691 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T17:28:15Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 15 17:28:20.349023 systemd[1]: modprobe@drm.service: Deactivated successfully. May 15 17:28:15.135924 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T17:28:15Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 15 17:28:15.135967 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T17:28:15Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 15 17:28:15.135982 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T17:28:15Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 15 17:28:15.136924 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T17:28:15Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 15 17:28:15.136962 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T17:28:15Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 15 17:28:15.136982 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T17:28:15Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.100: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.100 May 15 17:28:15.136999 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T17:28:15Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 15 17:28:15.137019 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T17:28:15Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.100: no such file or directory" path=/var/lib/torcx/store/3510.3.100 May 15 17:28:15.137034 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T17:28:15Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 15 17:28:18.381013 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T17:28:18Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 17:28:18.381320 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T17:28:18Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 17:28:18.381434 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T17:28:18Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 17:28:18.381631 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T17:28:18Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 17:28:18.381692 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T17:28:18Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 15 17:28:18.381765 /usr/lib/systemd/system-generators/torcx-generator[858]: time="2025-05-15T17:28:18Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 15 17:28:20.355042 systemd[1]: Finished modprobe@drm.service. May 15 17:28:20.355000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:20.355000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:20.356056 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 17:28:20.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:20.356000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:20.356434 systemd[1]: Finished modprobe@efi_pstore.service. May 15 17:28:20.357135 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 15 17:28:20.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:20.357000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:20.357255 systemd[1]: Finished modprobe@fuse.service. May 15 17:28:20.357900 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 17:28:20.358000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:20.358000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:20.358325 systemd[1]: Finished modprobe@loop.service. May 15 17:28:20.359000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:20.359299 systemd[1]: Finished systemd-modules-load.service. May 15 17:28:20.360371 systemd[1]: Finished systemd-network-generator.service. May 15 17:28:20.360000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:20.361085 systemd[1]: Finished systemd-remount-fs.service. May 15 17:28:20.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:20.361966 systemd[1]: Reached target network-pre.target. May 15 17:28:20.363815 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 15 17:28:20.367634 systemd[1]: Mounting sys-kernel-config.mount... May 15 17:28:20.368514 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 15 17:28:20.370416 systemd[1]: Starting systemd-hwdb-update.service... May 15 17:28:20.372322 systemd[1]: Starting systemd-journal-flush.service... May 15 17:28:20.373255 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 17:28:20.375411 systemd[1]: Starting systemd-random-seed.service... May 15 17:28:20.375927 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 17:28:20.376821 systemd[1]: Starting systemd-sysctl.service... May 15 17:28:20.380295 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 15 17:28:20.381202 systemd[1]: Mounted sys-kernel-config.mount. May 15 17:28:20.394780 systemd-journald[931]: Time spent on flushing to /var/log/journal/b3e63b15b486477f9a539709de3d70c9 is 21.680ms for 1101 entries. May 15 17:28:20.394780 systemd-journald[931]: System Journal (/var/log/journal/b3e63b15b486477f9a539709de3d70c9) is 8.0M, max 584.8M, 576.8M free. May 15 17:28:20.433240 systemd-journald[931]: Received client request to flush runtime journal. May 15 17:28:20.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:20.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:20.427000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:20.405704 systemd[1]: Finished flatcar-tmpfiles.service. May 15 17:28:20.434000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:20.407598 systemd[1]: Starting systemd-sysusers.service... May 15 17:28:20.410354 systemd[1]: Finished systemd-random-seed.service. May 15 17:28:20.410972 systemd[1]: Reached target first-boot-complete.target. May 15 17:28:20.426687 systemd[1]: Finished systemd-sysctl.service. May 15 17:28:20.433898 systemd[1]: Finished systemd-journal-flush.service. May 15 17:28:20.440000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:20.439695 systemd[1]: Finished systemd-udev-trigger.service. May 15 17:28:20.441618 systemd[1]: Starting systemd-udev-settle.service... May 15 17:28:20.453133 udevadm[968]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. May 15 17:28:20.470622 systemd[1]: Finished systemd-sysusers.service. May 15 17:28:20.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:20.472256 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 15 17:28:20.511150 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 15 17:28:20.511000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:21.105999 systemd[1]: Finished systemd-hwdb-update.service. May 15 17:28:21.106000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:21.107000 audit: BPF prog-id=24 op=LOAD May 15 17:28:21.107000 audit: BPF prog-id=25 op=LOAD May 15 17:28:21.107000 audit: BPF prog-id=7 op=UNLOAD May 15 17:28:21.107000 audit: BPF prog-id=8 op=UNLOAD May 15 17:28:21.108196 systemd[1]: Starting systemd-udevd.service... May 15 17:28:21.146953 systemd-udevd[971]: Using default interface naming scheme 'v252'. May 15 17:28:21.206000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:21.204462 systemd[1]: Started systemd-udevd.service. May 15 17:28:21.211000 audit: BPF prog-id=26 op=LOAD May 15 17:28:21.212996 systemd[1]: Starting systemd-networkd.service... May 15 17:28:21.236000 audit: BPF prog-id=27 op=LOAD May 15 17:28:21.236000 audit: BPF prog-id=28 op=LOAD May 15 17:28:21.236000 audit: BPF prog-id=29 op=LOAD May 15 17:28:21.239011 systemd[1]: Starting systemd-userdbd.service... May 15 17:28:21.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:21.282450 systemd[1]: Started systemd-userdbd.service. May 15 17:28:21.297042 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 15 17:28:21.353928 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 15 17:28:21.367135 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 15 17:28:21.373148 kernel: ACPI: button: Power Button [PWRF] May 15 17:28:21.384000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:21.384028 systemd-networkd[984]: lo: Link UP May 15 17:28:21.384037 systemd-networkd[984]: lo: Gained carrier May 15 17:28:21.384446 systemd-networkd[984]: Enumeration completed May 15 17:28:21.384540 systemd[1]: Started systemd-networkd.service. May 15 17:28:21.385808 systemd-networkd[984]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 15 17:28:21.387836 systemd-networkd[984]: eth0: Link UP May 15 17:28:21.387845 systemd-networkd[984]: eth0: Gained carrier May 15 17:28:21.395000 audit[973]: AVC avc: denied { confidentiality } for pid=973 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 15 17:28:21.402246 systemd-networkd[984]: eth0: DHCPv4 address 172.24.4.218/24, gateway 172.24.4.1 acquired from 172.24.4.1 May 15 17:28:21.395000 audit[973]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55a5add75330 a1=338ac a2=7f24ad407bc5 a3=5 items=110 ppid=971 pid=973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:28:21.395000 audit: CWD cwd="/" May 15 17:28:21.395000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=1 name=(null) inode=13725 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=2 name=(null) inode=13725 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=3 name=(null) inode=13731 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=4 name=(null) inode=13725 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=5 name=(null) inode=13732 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=6 name=(null) inode=13725 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=7 name=(null) inode=13733 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=8 name=(null) inode=13733 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=9 name=(null) inode=13734 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=10 name=(null) inode=13733 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=11 name=(null) inode=13735 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=12 name=(null) inode=13733 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=13 name=(null) inode=13736 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=14 name=(null) inode=13733 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=15 name=(null) inode=13737 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=16 name=(null) inode=13733 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=17 name=(null) inode=13738 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=18 name=(null) inode=13725 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=19 name=(null) inode=13739 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=20 name=(null) inode=13739 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=21 name=(null) inode=13740 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=22 name=(null) inode=13739 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=23 name=(null) inode=13741 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=24 name=(null) inode=13739 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=25 name=(null) inode=13742 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=26 name=(null) inode=13739 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=27 name=(null) inode=13743 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=28 name=(null) inode=13739 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=29 name=(null) inode=13744 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=30 name=(null) inode=13725 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=31 name=(null) inode=13745 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=32 name=(null) inode=13745 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=33 name=(null) inode=13746 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=34 name=(null) inode=13745 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=35 name=(null) inode=13747 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=36 name=(null) inode=13745 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=37 name=(null) inode=13748 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=38 name=(null) inode=13745 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=39 name=(null) inode=13749 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=40 name=(null) inode=13745 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=41 name=(null) inode=13750 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=42 name=(null) inode=13725 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=43 name=(null) inode=13751 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=44 name=(null) inode=13751 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=45 name=(null) inode=13752 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=46 name=(null) inode=13751 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=47 name=(null) inode=13753 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=48 name=(null) inode=13751 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=49 name=(null) inode=13754 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=50 name=(null) inode=13751 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=51 name=(null) inode=13755 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=52 name=(null) inode=13751 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=53 name=(null) inode=13756 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=55 name=(null) inode=13757 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=56 name=(null) inode=13757 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=57 name=(null) inode=13758 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=58 name=(null) inode=13757 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=59 name=(null) inode=13759 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=60 name=(null) inode=13757 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=61 name=(null) inode=13760 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=62 name=(null) inode=13760 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=63 name=(null) inode=13761 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=64 name=(null) inode=13760 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=65 name=(null) inode=13762 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=66 name=(null) inode=13760 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=67 name=(null) inode=13763 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=68 name=(null) inode=13760 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=69 name=(null) inode=13764 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=70 name=(null) inode=13760 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=71 name=(null) inode=13765 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=72 name=(null) inode=13757 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=73 name=(null) inode=13766 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=74 name=(null) inode=13766 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=75 name=(null) inode=13767 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=76 name=(null) inode=13766 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=77 name=(null) inode=13768 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=78 name=(null) inode=13766 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=79 name=(null) inode=13769 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=80 name=(null) inode=13766 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=81 name=(null) inode=13770 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=82 name=(null) inode=13766 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=83 name=(null) inode=13771 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=84 name=(null) inode=13757 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=85 name=(null) inode=13772 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=86 name=(null) inode=13772 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=87 name=(null) inode=13773 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=88 name=(null) inode=13772 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=89 name=(null) inode=13774 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=90 name=(null) inode=13772 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=91 name=(null) inode=13775 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=92 name=(null) inode=13772 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=93 name=(null) inode=13776 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=94 name=(null) inode=13772 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=95 name=(null) inode=13777 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=96 name=(null) inode=13757 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=97 name=(null) inode=13778 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=98 name=(null) inode=13778 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=99 name=(null) inode=13779 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=100 name=(null) inode=13778 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=101 name=(null) inode=13780 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=102 name=(null) inode=13778 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=103 name=(null) inode=13781 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=104 name=(null) inode=13778 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=105 name=(null) inode=13782 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=106 name=(null) inode=13778 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=107 name=(null) inode=13783 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PATH item=109 name=(null) inode=13784 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:28:21.395000 audit: PROCTITLE proctitle="(udev-worker)" May 15 17:28:21.423138 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 May 15 17:28:21.436143 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 May 15 17:28:21.441127 kernel: mousedev: PS/2 mouse device common for all mice May 15 17:28:21.494480 systemd[1]: Finished systemd-udev-settle.service. May 15 17:28:21.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:21.496245 systemd[1]: Starting lvm2-activation-early.service... May 15 17:28:21.524986 lvm[1005]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 15 17:28:21.553000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:21.551626 systemd[1]: Finished lvm2-activation-early.service. May 15 17:28:21.553518 systemd[1]: Reached target cryptsetup.target. May 15 17:28:21.557792 systemd[1]: Starting lvm2-activation.service... May 15 17:28:21.561448 lvm[1006]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 15 17:28:21.583652 systemd[1]: Finished lvm2-activation.service. May 15 17:28:21.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:21.585408 systemd[1]: Reached target local-fs-pre.target. May 15 17:28:21.587454 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 15 17:28:21.587832 systemd[1]: Reached target local-fs.target. May 15 17:28:21.589314 systemd[1]: Reached target machines.target. May 15 17:28:21.593528 systemd[1]: Starting ldconfig.service... May 15 17:28:21.597019 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 17:28:21.597327 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 17:28:21.599257 systemd[1]: Starting systemd-boot-update.service... May 15 17:28:21.600601 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 15 17:28:21.601999 systemd[1]: Starting systemd-machine-id-commit.service... May 15 17:28:21.603554 systemd[1]: Starting systemd-sysext.service... May 15 17:28:21.611537 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1008 (bootctl) May 15 17:28:21.612749 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 15 17:28:21.648799 systemd[1]: Unmounting usr-share-oem.mount... May 15 17:28:21.700841 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 15 17:28:21.702000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:21.703551 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 15 17:28:21.703905 systemd[1]: Unmounted usr-share-oem.mount. May 15 17:28:21.859154 kernel: loop0: detected capacity change from 0 to 205544 May 15 17:28:21.887882 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 15 17:28:21.889187 systemd[1]: Finished systemd-machine-id-commit.service. May 15 17:28:21.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:21.939571 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 15 17:28:21.974177 kernel: loop1: detected capacity change from 0 to 205544 May 15 17:28:22.022332 (sd-sysext)[1023]: Using extensions 'kubernetes'. May 15 17:28:22.024744 (sd-sysext)[1023]: Merged extensions into '/usr'. May 15 17:28:22.063813 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 17:28:22.066734 systemd[1]: Mounting usr-share-oem.mount... May 15 17:28:22.071764 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 17:28:22.073002 systemd[1]: Starting modprobe@dm_mod.service... May 15 17:28:22.075378 systemd[1]: Starting modprobe@efi_pstore.service... May 15 17:28:22.077575 systemd[1]: Starting modprobe@loop.service... May 15 17:28:22.078077 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 17:28:22.078235 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 17:28:22.078372 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 17:28:22.081426 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 17:28:22.081000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:22.081000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:22.081556 systemd[1]: Finished modprobe@dm_mod.service. May 15 17:28:22.083000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:22.083000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:22.082832 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 17:28:22.082946 systemd[1]: Finished modprobe@efi_pstore.service. May 15 17:28:22.083713 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 17:28:22.085178 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 17:28:22.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:22.085000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:22.085287 systemd[1]: Finished modprobe@loop.service. May 15 17:28:22.085982 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 17:28:22.089432 systemd[1]: Mounted usr-share-oem.mount. May 15 17:28:22.092361 systemd[1]: Finished systemd-sysext.service. May 15 17:28:22.092000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:22.093973 systemd[1]: Starting ensure-sysext.service... May 15 17:28:22.096501 systemd[1]: Starting systemd-tmpfiles-setup.service... May 15 17:28:22.096870 systemd-fsck[1020]: fsck.fat 4.2 (2021-01-31) May 15 17:28:22.096870 systemd-fsck[1020]: /dev/vda1: 790 files, 120732/258078 clusters May 15 17:28:22.103877 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 15 17:28:22.104000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:22.107623 systemd[1]: Mounting boot.mount... May 15 17:28:22.108358 systemd[1]: Reloading. May 15 17:28:22.122285 systemd-tmpfiles[1030]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 15 17:28:22.125356 systemd-tmpfiles[1030]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 15 17:28:22.128622 systemd-tmpfiles[1030]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 15 17:28:22.189241 /usr/lib/systemd/system-generators/torcx-generator[1050]: time="2025-05-15T17:28:22Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 17:28:22.189272 /usr/lib/systemd/system-generators/torcx-generator[1050]: time="2025-05-15T17:28:22Z" level=info msg="torcx already run" May 15 17:28:22.317293 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 17:28:22.317501 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 17:28:22.343630 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 17:28:22.406000 audit: BPF prog-id=30 op=LOAD May 15 17:28:22.406000 audit: BPF prog-id=21 op=UNLOAD May 15 17:28:22.406000 audit: BPF prog-id=31 op=LOAD May 15 17:28:22.406000 audit: BPF prog-id=32 op=LOAD May 15 17:28:22.406000 audit: BPF prog-id=22 op=UNLOAD May 15 17:28:22.406000 audit: BPF prog-id=23 op=UNLOAD May 15 17:28:22.408000 audit: BPF prog-id=33 op=LOAD May 15 17:28:22.408000 audit: BPF prog-id=27 op=UNLOAD May 15 17:28:22.408000 audit: BPF prog-id=34 op=LOAD May 15 17:28:22.409000 audit: BPF prog-id=35 op=LOAD May 15 17:28:22.409000 audit: BPF prog-id=28 op=UNLOAD May 15 17:28:22.409000 audit: BPF prog-id=29 op=UNLOAD May 15 17:28:22.410000 audit: BPF prog-id=36 op=LOAD May 15 17:28:22.411000 audit: BPF prog-id=37 op=LOAD May 15 17:28:22.411000 audit: BPF prog-id=24 op=UNLOAD May 15 17:28:22.411000 audit: BPF prog-id=25 op=UNLOAD May 15 17:28:22.412000 audit: BPF prog-id=38 op=LOAD May 15 17:28:22.412000 audit: BPF prog-id=26 op=UNLOAD May 15 17:28:22.421496 systemd[1]: Mounted boot.mount. May 15 17:28:22.441051 systemd[1]: Finished ensure-sysext.service. May 15 17:28:22.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:22.443669 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 17:28:22.445357 systemd[1]: Starting modprobe@dm_mod.service... May 15 17:28:22.447488 systemd[1]: Starting modprobe@drm.service... May 15 17:28:22.450179 systemd[1]: Starting modprobe@efi_pstore.service... May 15 17:28:22.452655 systemd[1]: Starting modprobe@loop.service... May 15 17:28:22.453351 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 17:28:22.453464 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 17:28:22.454948 systemd[1]: Starting systemd-networkd-wait-online.service... May 15 17:28:22.457981 systemd[1]: Finished systemd-boot-update.service. May 15 17:28:22.458000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:22.459019 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 17:28:22.459740 systemd[1]: Finished modprobe@dm_mod.service. May 15 17:28:22.460000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:22.460000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:22.460722 systemd[1]: modprobe@drm.service: Deactivated successfully. May 15 17:28:22.460989 systemd[1]: Finished modprobe@drm.service. May 15 17:28:22.461000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:22.461000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:22.462487 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 17:28:22.463171 systemd[1]: Finished modprobe@efi_pstore.service. May 15 17:28:22.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:22.463000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:22.463963 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 17:28:22.464364 systemd[1]: Finished modprobe@loop.service. May 15 17:28:22.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:22.465000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:22.467491 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 17:28:22.467544 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 17:28:22.521442 ldconfig[1007]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 15 17:28:22.533925 systemd[1]: Finished systemd-tmpfiles-setup.service. May 15 17:28:22.535000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:22.538014 systemd[1]: Starting audit-rules.service... May 15 17:28:22.542578 systemd[1]: Starting clean-ca-certificates.service... May 15 17:28:22.547000 audit: BPF prog-id=39 op=LOAD May 15 17:28:22.549000 audit: BPF prog-id=40 op=LOAD May 15 17:28:22.554000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:22.545777 systemd[1]: Starting systemd-journal-catalog-update.service... May 15 17:28:22.547937 systemd[1]: Starting systemd-resolved.service... May 15 17:28:22.549810 systemd[1]: Starting systemd-timesyncd.service... May 15 17:28:22.553541 systemd[1]: Starting systemd-update-utmp.service... May 15 17:28:22.554535 systemd[1]: Finished ldconfig.service. May 15 17:28:22.577000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:22.577064 systemd[1]: Finished clean-ca-certificates.service. May 15 17:28:22.577681 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 17:28:22.579000 audit[1109]: SYSTEM_BOOT pid=1109 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 15 17:28:22.583000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:22.582979 systemd[1]: Finished systemd-update-utmp.service. May 15 17:28:22.617000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:22.617433 systemd[1]: Finished systemd-journal-catalog-update.service. May 15 17:28:22.619191 systemd[1]: Starting systemd-update-done.service... May 15 17:28:22.625673 systemd[1]: Finished systemd-update-done.service. May 15 17:28:22.630000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:22.635000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 15 17:28:22.635000 audit[1123]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffd69995b0 a2=420 a3=0 items=0 ppid=1103 pid=1123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:28:22.635000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 15 17:28:22.636228 systemd[1]: Finished audit-rules.service. May 15 17:28:22.636904 augenrules[1123]: No rules May 15 17:28:22.644063 systemd[1]: Started systemd-timesyncd.service. May 15 17:28:22.644728 systemd[1]: Reached target time-set.target. May 15 17:28:22.658747 systemd-resolved[1107]: Positive Trust Anchors: May 15 17:28:22.658767 systemd-resolved[1107]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 15 17:28:22.658802 systemd-resolved[1107]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 15 17:28:22.666835 systemd-resolved[1107]: Using system hostname 'ci-3510-3-100-77fbd20122.novalocal'. May 15 17:28:22.668294 systemd[1]: Started systemd-resolved.service. May 15 17:28:22.668789 systemd[1]: Reached target network.target. May 15 17:28:22.669232 systemd[1]: Reached target nss-lookup.target. May 15 17:28:22.669701 systemd[1]: Reached target sysinit.target. May 15 17:28:22.670301 systemd[1]: Started motdgen.path. May 15 17:28:22.670785 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 15 17:28:22.671465 systemd[1]: Started logrotate.timer. May 15 17:28:22.671977 systemd[1]: Started mdadm.timer. May 15 17:28:22.672436 systemd[1]: Started systemd-tmpfiles-clean.timer. May 15 17:28:22.672917 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 15 17:28:22.672945 systemd[1]: Reached target paths.target. May 15 17:28:22.673413 systemd[1]: Reached target timers.target. May 15 17:28:22.674097 systemd[1]: Listening on dbus.socket. May 15 17:28:22.675522 systemd[1]: Starting docker.socket... May 15 17:28:22.678982 systemd[1]: Listening on sshd.socket. May 15 17:28:22.679607 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 17:28:22.679987 systemd[1]: Listening on docker.socket. May 15 17:28:22.680612 systemd[1]: Reached target sockets.target. May 15 17:28:22.681132 systemd[1]: Reached target basic.target. May 15 17:28:22.681670 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 15 17:28:22.681693 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 15 17:28:22.682791 systemd[1]: Starting containerd.service... May 15 17:28:22.684334 systemd[1]: Starting coreos-metadata-sshkeys@core.service... May 15 17:28:22.686005 systemd[1]: Starting dbus.service... May 15 17:28:22.688997 systemd[1]: Starting enable-oem-cloudinit.service... May 15 17:28:22.696244 systemd[1]: Starting extend-filesystems.service... May 15 17:28:22.698975 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 15 17:28:22.700191 systemd[1]: Starting motdgen.service... May 15 17:28:22.703229 systemd[1]: Starting ssh-key-proc-cmdline.service... May 15 17:28:22.704727 systemd[1]: Starting sshd-keygen.service... May 15 17:28:22.710519 systemd[1]: Starting systemd-logind.service... May 15 17:28:22.711070 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 17:28:22.711481 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 15 17:28:22.711918 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 15 17:28:22.712605 systemd[1]: Starting update-engine.service... May 15 17:28:22.713988 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 15 17:28:22.717002 jq[1149]: true May 15 17:28:22.721411 jq[1137]: false May 15 17:28:22.718393 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 17:28:22.718433 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 17:28:22.718831 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 15 17:28:22.719000 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 15 17:28:22.724286 systemd[1]: Created slice system-sshd.slice. May 15 17:28:22.738678 jq[1151]: true May 15 17:28:22.744774 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 15 17:28:22.744939 systemd[1]: Finished ssh-key-proc-cmdline.service. May 15 17:28:22.760364 extend-filesystems[1138]: Found loop1 May 15 17:28:22.763314 extend-filesystems[1138]: Found vda May 15 17:28:22.764063 extend-filesystems[1138]: Found vda1 May 15 17:28:22.765188 extend-filesystems[1138]: Found vda2 May 15 17:28:22.765766 extend-filesystems[1138]: Found vda3 May 15 17:28:22.766365 extend-filesystems[1138]: Found usr May 15 17:28:22.767769 extend-filesystems[1138]: Found vda4 May 15 17:28:22.767769 extend-filesystems[1138]: Found vda6 May 15 17:28:22.767769 extend-filesystems[1138]: Found vda7 May 15 17:28:22.767769 extend-filesystems[1138]: Found vda9 May 15 17:28:22.767769 extend-filesystems[1138]: Checking size of /dev/vda9 May 15 17:28:22.772329 systemd[1]: Started dbus.service. May 15 17:28:22.772136 dbus-daemon[1134]: [system] SELinux support is enabled May 15 17:28:22.774796 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 15 17:28:22.774818 systemd[1]: Reached target system-config.target. May 15 17:28:22.775307 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 15 17:28:22.775323 systemd[1]: Reached target user-config.target. May 15 17:28:22.789001 systemd[1]: motdgen.service: Deactivated successfully. May 15 17:28:22.789194 systemd[1]: Finished motdgen.service. May 15 17:28:22.796241 extend-filesystems[1138]: Resized partition /dev/vda9 May 15 17:28:24.157761 systemd-resolved[1107]: Clock change detected. Flushing caches. May 15 17:28:24.158053 systemd-timesyncd[1108]: Contacted time server 23.186.168.127:123 (0.flatcar.pool.ntp.org). May 15 17:28:24.158420 systemd-timesyncd[1108]: Initial clock synchronization to Thu 2025-05-15 17:28:24.157703 UTC. May 15 17:28:24.164266 extend-filesystems[1181]: resize2fs 1.46.5 (30-Dec-2021) May 15 17:28:24.188162 env[1153]: time="2025-05-15T17:28:24.186174680Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 15 17:28:24.217106 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 2014203 blocks May 15 17:28:24.220550 kernel: EXT4-fs (vda9): resized filesystem to 2014203 May 15 17:28:24.240677 env[1153]: time="2025-05-15T17:28:24.240358472Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 15 17:28:24.275114 env[1153]: time="2025-05-15T17:28:24.274934850Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 15 17:28:24.275276 systemd-logind[1145]: Watching system buttons on /dev/input/event1 (Power Button) May 15 17:28:24.277344 extend-filesystems[1181]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 15 17:28:24.277344 extend-filesystems[1181]: old_desc_blocks = 1, new_desc_blocks = 1 May 15 17:28:24.277344 extend-filesystems[1181]: The filesystem on /dev/vda9 is now 2014203 (4k) blocks long. May 15 17:28:24.275296 systemd-logind[1145]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 15 17:28:24.287228 update_engine[1147]: I0515 17:28:24.277522 1147 main.cc:92] Flatcar Update Engine starting May 15 17:28:24.287412 extend-filesystems[1138]: Resized filesystem in /dev/vda9 May 15 17:28:24.289164 env[1153]: time="2025-05-15T17:28:24.278294671Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.182-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 15 17:28:24.289164 env[1153]: time="2025-05-15T17:28:24.278330949Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 15 17:28:24.289164 env[1153]: time="2025-05-15T17:28:24.278567273Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 15 17:28:24.289164 env[1153]: time="2025-05-15T17:28:24.278587691Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 15 17:28:24.289164 env[1153]: time="2025-05-15T17:28:24.278602188Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 15 17:28:24.289164 env[1153]: time="2025-05-15T17:28:24.278614852Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 15 17:28:24.289164 env[1153]: time="2025-05-15T17:28:24.278701294Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 15 17:28:24.289164 env[1153]: time="2025-05-15T17:28:24.278925835Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 15 17:28:24.289164 env[1153]: time="2025-05-15T17:28:24.279063904Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 15 17:28:24.289164 env[1153]: time="2025-05-15T17:28:24.279161066Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 15 17:28:24.276055 systemd[1]: extend-filesystems.service: Deactivated successfully. May 15 17:28:24.289977 env[1153]: time="2025-05-15T17:28:24.279242990Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 15 17:28:24.289977 env[1153]: time="2025-05-15T17:28:24.279259080Z" level=info msg="metadata content store policy set" policy=shared May 15 17:28:24.276248 systemd[1]: Finished extend-filesystems.service. May 15 17:28:24.291388 update_engine[1147]: I0515 17:28:24.291127 1147 update_check_scheduler.cc:74] Next update check in 7m2s May 15 17:28:24.276989 systemd-logind[1145]: New seat seat0. May 15 17:28:24.283180 systemd[1]: Started systemd-logind.service. May 15 17:28:24.291019 systemd[1]: Started update-engine.service. May 15 17:28:24.293397 systemd[1]: Started locksmithd.service. May 15 17:28:24.295652 bash[1185]: Updated "/home/core/.ssh/authorized_keys" May 15 17:28:24.295923 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 15 17:28:24.302112 env[1153]: time="2025-05-15T17:28:24.300366888Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 15 17:28:24.302112 env[1153]: time="2025-05-15T17:28:24.300408135Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 15 17:28:24.302112 env[1153]: time="2025-05-15T17:28:24.300425187Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 15 17:28:24.302112 env[1153]: time="2025-05-15T17:28:24.300464070Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 15 17:28:24.302112 env[1153]: time="2025-05-15T17:28:24.300482124Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 15 17:28:24.302112 env[1153]: time="2025-05-15T17:28:24.300497924Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 15 17:28:24.302112 env[1153]: time="2025-05-15T17:28:24.300512421Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 15 17:28:24.302112 env[1153]: time="2025-05-15T17:28:24.300529002Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 15 17:28:24.302112 env[1153]: time="2025-05-15T17:28:24.300544160Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 15 17:28:24.302112 env[1153]: time="2025-05-15T17:28:24.300559920Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 15 17:28:24.302112 env[1153]: time="2025-05-15T17:28:24.300576741Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 15 17:28:24.302112 env[1153]: time="2025-05-15T17:28:24.300591659Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 15 17:28:24.302112 env[1153]: time="2025-05-15T17:28:24.300726362Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 15 17:28:24.302112 env[1153]: time="2025-05-15T17:28:24.300814688Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 15 17:28:24.302473 env[1153]: time="2025-05-15T17:28:24.301110272Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 15 17:28:24.302473 env[1153]: time="2025-05-15T17:28:24.301139607Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 15 17:28:24.302473 env[1153]: time="2025-05-15T17:28:24.301155477Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 15 17:28:24.302473 env[1153]: time="2025-05-15T17:28:24.301207925Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 15 17:28:24.302473 env[1153]: time="2025-05-15T17:28:24.301224336Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 15 17:28:24.302473 env[1153]: time="2025-05-15T17:28:24.301240066Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 15 17:28:24.302473 env[1153]: time="2025-05-15T17:28:24.301253230Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 15 17:28:24.302473 env[1153]: time="2025-05-15T17:28:24.301267337Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 15 17:28:24.302473 env[1153]: time="2025-05-15T17:28:24.301281133Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 15 17:28:24.302473 env[1153]: time="2025-05-15T17:28:24.301295109Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 15 17:28:24.302473 env[1153]: time="2025-05-15T17:28:24.301310538Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 15 17:28:24.302473 env[1153]: time="2025-05-15T17:28:24.301326498Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 15 17:28:24.302473 env[1153]: time="2025-05-15T17:28:24.301464406Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 15 17:28:24.302473 env[1153]: time="2025-05-15T17:28:24.301483923Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 15 17:28:24.302473 env[1153]: time="2025-05-15T17:28:24.301498941Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 15 17:28:24.302822 env[1153]: time="2025-05-15T17:28:24.301513659Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 15 17:28:24.302822 env[1153]: time="2025-05-15T17:28:24.301530731Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 15 17:28:24.302822 env[1153]: time="2025-05-15T17:28:24.301544607Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 15 17:28:24.302822 env[1153]: time="2025-05-15T17:28:24.301567730Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 15 17:28:24.302822 env[1153]: time="2025-05-15T17:28:24.301605451Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 15 17:28:24.302946 env[1153]: time="2025-05-15T17:28:24.301816978Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 15 17:28:24.302946 env[1153]: time="2025-05-15T17:28:24.301887510Z" level=info msg="Connect containerd service" May 15 17:28:24.302946 env[1153]: time="2025-05-15T17:28:24.301921413Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 15 17:28:24.305908 env[1153]: time="2025-05-15T17:28:24.303475989Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 15 17:28:24.305908 env[1153]: time="2025-05-15T17:28:24.303696322Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 15 17:28:24.305908 env[1153]: time="2025-05-15T17:28:24.303737499Z" level=info msg=serving... address=/run/containerd/containerd.sock May 15 17:28:24.305908 env[1153]: time="2025-05-15T17:28:24.304342845Z" level=info msg="containerd successfully booted in 0.119949s" May 15 17:28:24.303834 systemd[1]: Started containerd.service. May 15 17:28:24.308202 env[1153]: time="2025-05-15T17:28:24.308154403Z" level=info msg="Start subscribing containerd event" May 15 17:28:24.308262 env[1153]: time="2025-05-15T17:28:24.308228412Z" level=info msg="Start recovering state" May 15 17:28:24.308329 env[1153]: time="2025-05-15T17:28:24.308307711Z" level=info msg="Start event monitor" May 15 17:28:24.308372 env[1153]: time="2025-05-15T17:28:24.308332407Z" level=info msg="Start snapshots syncer" May 15 17:28:24.308372 env[1153]: time="2025-05-15T17:28:24.308345382Z" level=info msg="Start cni network conf syncer for default" May 15 17:28:24.308372 env[1153]: time="2025-05-15T17:28:24.308359728Z" level=info msg="Start streaming server" May 15 17:28:24.471197 locksmithd[1192]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 15 17:28:24.683582 systemd-networkd[984]: eth0: Gained IPv6LL May 15 17:28:24.686536 systemd[1]: Finished systemd-networkd-wait-online.service. May 15 17:28:24.687461 systemd[1]: Reached target network-online.target. May 15 17:28:24.689866 systemd[1]: Starting kubelet.service... May 15 17:28:25.045251 sshd_keygen[1154]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 15 17:28:25.065245 systemd[1]: Finished sshd-keygen.service. May 15 17:28:25.067293 systemd[1]: Starting issuegen.service... May 15 17:28:25.068716 systemd[1]: Started sshd@0-172.24.4.218:22-172.24.4.1:50848.service. May 15 17:28:25.073759 systemd[1]: issuegen.service: Deactivated successfully. May 15 17:28:25.073918 systemd[1]: Finished issuegen.service. May 15 17:28:25.076174 systemd[1]: Starting systemd-user-sessions.service... May 15 17:28:25.084275 systemd[1]: Finished systemd-user-sessions.service. May 15 17:28:25.086170 systemd[1]: Started getty@tty1.service. May 15 17:28:25.088537 systemd[1]: Started serial-getty@ttyS0.service. May 15 17:28:25.089654 systemd[1]: Reached target getty.target. May 15 17:28:26.085656 sshd[1207]: Accepted publickey for core from 172.24.4.1 port 50848 ssh2: RSA SHA256:v08kzkYsYb/v3TYLimzYuYz4HHWAchkqQmS+KxnMDUw May 15 17:28:26.088333 sshd[1207]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 17:28:26.101908 systemd[1]: Created slice user-500.slice. May 15 17:28:26.104736 systemd[1]: Starting user-runtime-dir@500.service... May 15 17:28:26.112692 systemd-logind[1145]: New session 1 of user core. May 15 17:28:26.119545 systemd[1]: Finished user-runtime-dir@500.service. May 15 17:28:26.122548 systemd[1]: Starting user@500.service... May 15 17:28:26.129697 (systemd)[1216]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 15 17:28:26.230825 systemd[1216]: Queued start job for default target default.target. May 15 17:28:26.232144 systemd[1216]: Reached target paths.target. May 15 17:28:26.232264 systemd[1216]: Reached target sockets.target. May 15 17:28:26.232345 systemd[1216]: Reached target timers.target. May 15 17:28:26.232444 systemd[1216]: Reached target basic.target. May 15 17:28:26.232606 systemd[1]: Started user@500.service. May 15 17:28:26.233986 systemd[1]: Started session-1.scope. May 15 17:28:26.235202 systemd[1216]: Reached target default.target. May 15 17:28:26.235361 systemd[1216]: Startup finished in 98ms. May 15 17:28:26.382605 systemd[1]: Started kubelet.service. May 15 17:28:26.705604 systemd[1]: Started sshd@1-172.24.4.218:22-172.24.4.1:50852.service. May 15 17:28:28.117529 sshd[1233]: Accepted publickey for core from 172.24.4.1 port 50852 ssh2: RSA SHA256:v08kzkYsYb/v3TYLimzYuYz4HHWAchkqQmS+KxnMDUw May 15 17:28:28.119461 sshd[1233]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 17:28:28.131816 systemd-logind[1145]: New session 2 of user core. May 15 17:28:28.132529 systemd[1]: Started session-2.scope. May 15 17:28:28.134676 kubelet[1225]: E0515 17:28:28.134018 1225 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 17:28:28.139746 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 17:28:28.140039 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 17:28:28.140536 systemd[1]: kubelet.service: Consumed 1.864s CPU time. May 15 17:28:28.758980 sshd[1233]: pam_unix(sshd:session): session closed for user core May 15 17:28:28.766841 systemd[1]: Started sshd@2-172.24.4.218:22-172.24.4.1:50866.service. May 15 17:28:28.770366 systemd[1]: sshd@1-172.24.4.218:22-172.24.4.1:50852.service: Deactivated successfully. May 15 17:28:28.771954 systemd[1]: session-2.scope: Deactivated successfully. May 15 17:28:28.775843 systemd-logind[1145]: Session 2 logged out. Waiting for processes to exit. May 15 17:28:28.778341 systemd-logind[1145]: Removed session 2. May 15 17:28:30.051553 sshd[1239]: Accepted publickey for core from 172.24.4.1 port 50866 ssh2: RSA SHA256:v08kzkYsYb/v3TYLimzYuYz4HHWAchkqQmS+KxnMDUw May 15 17:28:30.054858 sshd[1239]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 17:28:30.064855 systemd-logind[1145]: New session 3 of user core. May 15 17:28:30.065350 systemd[1]: Started session-3.scope. May 15 17:28:30.691842 sshd[1239]: pam_unix(sshd:session): session closed for user core May 15 17:28:30.697021 systemd[1]: sshd@2-172.24.4.218:22-172.24.4.1:50866.service: Deactivated successfully. May 15 17:28:30.698528 systemd[1]: session-3.scope: Deactivated successfully. May 15 17:28:30.699880 systemd-logind[1145]: Session 3 logged out. Waiting for processes to exit. May 15 17:28:30.701743 systemd-logind[1145]: Removed session 3. May 15 17:28:31.180965 coreos-metadata[1133]: May 15 17:28:31.180 WARN failed to locate config-drive, using the metadata service API instead May 15 17:28:31.274336 coreos-metadata[1133]: May 15 17:28:31.274 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 May 15 17:28:31.495585 coreos-metadata[1133]: May 15 17:28:31.494 INFO Fetch successful May 15 17:28:31.495990 coreos-metadata[1133]: May 15 17:28:31.495 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 May 15 17:28:31.511156 coreos-metadata[1133]: May 15 17:28:31.510 INFO Fetch successful May 15 17:28:31.515957 unknown[1133]: wrote ssh authorized keys file for user: core May 15 17:28:31.546716 update-ssh-keys[1247]: Updated "/home/core/.ssh/authorized_keys" May 15 17:28:31.548603 systemd[1]: Finished coreos-metadata-sshkeys@core.service. May 15 17:28:31.549552 systemd[1]: Reached target multi-user.target. May 15 17:28:31.552571 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 15 17:28:31.568703 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 15 17:28:31.569037 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 15 17:28:31.570173 systemd[1]: Startup finished in 1.080s (kernel) + 7.889s (initrd) + 15.579s (userspace) = 24.550s. May 15 17:28:38.392000 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 15 17:28:38.392654 systemd[1]: Stopped kubelet.service. May 15 17:28:38.392754 systemd[1]: kubelet.service: Consumed 1.864s CPU time. May 15 17:28:38.396346 systemd[1]: Starting kubelet.service... May 15 17:28:38.726822 systemd[1]: Started kubelet.service. May 15 17:28:38.983498 kubelet[1253]: E0515 17:28:38.983274 1253 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 17:28:38.990366 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 17:28:38.990677 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 17:28:40.701109 systemd[1]: Started sshd@3-172.24.4.218:22-172.24.4.1:58014.service. May 15 17:28:42.098514 sshd[1259]: Accepted publickey for core from 172.24.4.1 port 58014 ssh2: RSA SHA256:v08kzkYsYb/v3TYLimzYuYz4HHWAchkqQmS+KxnMDUw May 15 17:28:42.100991 sshd[1259]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 17:28:42.108374 systemd[1]: Started session-4.scope. May 15 17:28:42.109564 systemd-logind[1145]: New session 4 of user core. May 15 17:28:42.756881 sshd[1259]: pam_unix(sshd:session): session closed for user core May 15 17:28:42.763957 systemd[1]: Started sshd@4-172.24.4.218:22-172.24.4.1:58020.service. May 15 17:28:42.767717 systemd[1]: sshd@3-172.24.4.218:22-172.24.4.1:58014.service: Deactivated successfully. May 15 17:28:42.770625 systemd[1]: session-4.scope: Deactivated successfully. May 15 17:28:42.773004 systemd-logind[1145]: Session 4 logged out. Waiting for processes to exit. May 15 17:28:42.775683 systemd-logind[1145]: Removed session 4. May 15 17:28:44.113311 sshd[1264]: Accepted publickey for core from 172.24.4.1 port 58020 ssh2: RSA SHA256:v08kzkYsYb/v3TYLimzYuYz4HHWAchkqQmS+KxnMDUw May 15 17:28:44.117444 sshd[1264]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 17:28:44.126764 systemd-logind[1145]: New session 5 of user core. May 15 17:28:44.129167 systemd[1]: Started session-5.scope. May 15 17:28:44.728237 sshd[1264]: pam_unix(sshd:session): session closed for user core May 15 17:28:44.735129 systemd[1]: Started sshd@5-172.24.4.218:22-172.24.4.1:48696.service. May 15 17:28:44.736319 systemd[1]: sshd@4-172.24.4.218:22-172.24.4.1:58020.service: Deactivated successfully. May 15 17:28:44.739414 systemd[1]: session-5.scope: Deactivated successfully. May 15 17:28:44.742073 systemd-logind[1145]: Session 5 logged out. Waiting for processes to exit. May 15 17:28:44.745443 systemd-logind[1145]: Removed session 5. May 15 17:28:46.302734 sshd[1270]: Accepted publickey for core from 172.24.4.1 port 48696 ssh2: RSA SHA256:v08kzkYsYb/v3TYLimzYuYz4HHWAchkqQmS+KxnMDUw May 15 17:28:46.306036 sshd[1270]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 17:28:46.317121 systemd[1]: Started session-6.scope. May 15 17:28:46.318536 systemd-logind[1145]: New session 6 of user core. May 15 17:28:46.862560 sshd[1270]: pam_unix(sshd:session): session closed for user core May 15 17:28:46.875656 systemd[1]: sshd@5-172.24.4.218:22-172.24.4.1:48696.service: Deactivated successfully. May 15 17:28:46.878534 systemd[1]: session-6.scope: Deactivated successfully. May 15 17:28:46.880392 systemd-logind[1145]: Session 6 logged out. Waiting for processes to exit. May 15 17:28:46.884237 systemd[1]: Started sshd@6-172.24.4.218:22-172.24.4.1:48706.service. May 15 17:28:46.887485 systemd-logind[1145]: Removed session 6. May 15 17:28:48.319014 sshd[1277]: Accepted publickey for core from 172.24.4.1 port 48706 ssh2: RSA SHA256:v08kzkYsYb/v3TYLimzYuYz4HHWAchkqQmS+KxnMDUw May 15 17:28:48.321934 sshd[1277]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 17:28:48.336793 systemd-logind[1145]: New session 7 of user core. May 15 17:28:48.338131 systemd[1]: Started session-7.scope. May 15 17:28:48.819707 sudo[1280]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 15 17:28:48.820972 sudo[1280]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 17:28:48.832475 dbus-daemon[1134]: Н\x8d\x8d\u0010V: received setenforce notice (enforcing=1360687808) May 15 17:28:48.836665 sudo[1280]: pam_unix(sudo:session): session closed for user root May 15 17:28:49.084660 sshd[1277]: pam_unix(sshd:session): session closed for user core May 15 17:28:49.089564 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 15 17:28:49.089926 systemd[1]: Stopped kubelet.service. May 15 17:28:49.093491 systemd[1]: Starting kubelet.service... May 15 17:28:49.096057 systemd[1]: Started sshd@7-172.24.4.218:22-172.24.4.1:48716.service. May 15 17:28:49.102893 systemd[1]: sshd@6-172.24.4.218:22-172.24.4.1:48706.service: Deactivated successfully. May 15 17:28:49.109416 systemd[1]: session-7.scope: Deactivated successfully. May 15 17:28:49.114286 systemd-logind[1145]: Session 7 logged out. Waiting for processes to exit. May 15 17:28:49.128428 systemd-logind[1145]: Removed session 7. May 15 17:28:49.393748 systemd[1]: Started kubelet.service. May 15 17:28:49.579780 kubelet[1290]: E0515 17:28:49.579635 1290 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 17:28:49.587479 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 17:28:49.587829 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 17:28:50.488995 sshd[1284]: Accepted publickey for core from 172.24.4.1 port 48716 ssh2: RSA SHA256:v08kzkYsYb/v3TYLimzYuYz4HHWAchkqQmS+KxnMDUw May 15 17:28:50.492201 sshd[1284]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 17:28:50.504332 systemd-logind[1145]: New session 8 of user core. May 15 17:28:50.505156 systemd[1]: Started session-8.scope. May 15 17:28:50.809531 sudo[1298]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 15 17:28:50.810835 sudo[1298]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 17:28:50.817275 sudo[1298]: pam_unix(sudo:session): session closed for user root May 15 17:28:50.828466 sudo[1297]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 15 17:28:50.829561 sudo[1297]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 17:28:50.849891 systemd[1]: Stopping audit-rules.service... May 15 17:28:50.851000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 15 17:28:50.853410 auditctl[1301]: No rules May 15 17:28:50.855922 kernel: kauditd_printk_skb: 230 callbacks suppressed May 15 17:28:50.856065 kernel: audit: type=1305 audit(1747330130.851:211): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 15 17:28:50.856717 systemd[1]: audit-rules.service: Deactivated successfully. May 15 17:28:50.857128 systemd[1]: Stopped audit-rules.service. May 15 17:28:50.851000 audit[1301]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe8f9cff10 a2=420 a3=0 items=0 ppid=1 pid=1301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:28:50.873414 systemd[1]: Starting audit-rules.service... May 15 17:28:50.878685 kernel: audit: type=1300 audit(1747330130.851:211): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe8f9cff10 a2=420 a3=0 items=0 ppid=1 pid=1301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:28:50.851000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 15 17:28:50.885163 kernel: audit: type=1327 audit(1747330130.851:211): proctitle=2F7362696E2F617564697463746C002D44 May 15 17:28:50.855000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:50.901171 kernel: audit: type=1131 audit(1747330130.855:212): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:50.921372 augenrules[1318]: No rules May 15 17:28:50.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:50.923428 systemd[1]: Finished audit-rules.service. May 15 17:28:50.936537 sudo[1297]: pam_unix(sudo:session): session closed for user root May 15 17:28:50.938158 kernel: audit: type=1130 audit(1747330130.922:213): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:50.938322 kernel: audit: type=1106 audit(1747330130.935:214): pid=1297 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 17:28:50.935000 audit[1297]: USER_END pid=1297 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 17:28:50.935000 audit[1297]: CRED_DISP pid=1297 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 17:28:50.957178 kernel: audit: type=1104 audit(1747330130.935:215): pid=1297 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 17:28:51.251824 sshd[1284]: pam_unix(sshd:session): session closed for user core May 15 17:28:51.253000 audit[1284]: USER_END pid=1284 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 17:28:51.275246 kernel: audit: type=1106 audit(1747330131.253:216): pid=1284 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 17:28:51.266479 systemd[1]: Started sshd@8-172.24.4.218:22-172.24.4.1:48732.service. May 15 17:28:51.267790 systemd[1]: sshd@7-172.24.4.218:22-172.24.4.1:48716.service: Deactivated successfully. May 15 17:28:51.269284 systemd[1]: session-8.scope: Deactivated successfully. May 15 17:28:51.254000 audit[1284]: CRED_DISP pid=1284 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 17:28:51.265000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.218:22-172.24.4.1:48732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:51.290997 systemd-logind[1145]: Session 8 logged out. Waiting for processes to exit. May 15 17:28:51.304020 kernel: audit: type=1104 audit(1747330131.254:217): pid=1284 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 17:28:51.304550 kernel: audit: type=1130 audit(1747330131.265:218): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.218:22-172.24.4.1:48732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:51.267000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.24.4.218:22-172.24.4.1:48716 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:51.305423 systemd-logind[1145]: Removed session 8. May 15 17:28:52.610000 audit[1323]: USER_ACCT pid=1323 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 17:28:52.611836 sshd[1323]: Accepted publickey for core from 172.24.4.1 port 48732 ssh2: RSA SHA256:v08kzkYsYb/v3TYLimzYuYz4HHWAchkqQmS+KxnMDUw May 15 17:28:52.612000 audit[1323]: CRED_ACQ pid=1323 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 17:28:52.612000 audit[1323]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffffd642f60 a2=3 a3=0 items=0 ppid=1 pid=1323 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:28:52.612000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 17:28:52.615026 sshd[1323]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 17:28:52.624207 systemd-logind[1145]: New session 9 of user core. May 15 17:28:52.625858 systemd[1]: Started session-9.scope. May 15 17:28:52.636000 audit[1323]: USER_START pid=1323 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 17:28:52.640000 audit[1326]: CRED_ACQ pid=1326 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 17:28:53.079000 audit[1327]: USER_ACCT pid=1327 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 17:28:53.081205 sudo[1327]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 15 17:28:53.080000 audit[1327]: CRED_REFR pid=1327 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 17:28:53.082537 sudo[1327]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 17:28:53.085000 audit[1327]: USER_START pid=1327 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 17:28:53.113515 systemd[1]: Starting coreos-metadata.service... May 15 17:28:59.707713 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. May 15 17:28:59.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:59.708449 systemd[1]: Stopped kubelet.service. May 15 17:28:59.717419 kernel: kauditd_printk_skb: 11 callbacks suppressed May 15 17:28:59.717566 kernel: audit: type=1130 audit(1747330139.707:228): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:59.712601 systemd[1]: Starting kubelet.service... May 15 17:28:59.707000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:28:59.741188 kernel: audit: type=1131 audit(1747330139.707:229): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:29:00.023000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:29:00.023936 systemd[1]: Started kubelet.service. May 15 17:29:00.039143 kernel: audit: type=1130 audit(1747330140.023:230): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:29:00.085869 kubelet[1340]: E0515 17:29:00.085821 1340 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 17:29:00.087000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 17:29:00.088587 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 17:29:00.088715 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 17:29:00.101136 kernel: audit: type=1131 audit(1747330140.087:231): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 17:29:00.181680 coreos-metadata[1331]: May 15 17:29:00.181 WARN failed to locate config-drive, using the metadata service API instead May 15 17:29:00.270528 coreos-metadata[1331]: May 15 17:29:00.269 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 May 15 17:29:00.517407 coreos-metadata[1331]: May 15 17:29:00.516 INFO Fetch successful May 15 17:29:00.518190 coreos-metadata[1331]: May 15 17:29:00.517 INFO Fetching http://169.254.169.254/latest/meta-data/instance-id: Attempt #1 May 15 17:29:00.532599 coreos-metadata[1331]: May 15 17:29:00.532 INFO Fetch successful May 15 17:29:00.532887 coreos-metadata[1331]: May 15 17:29:00.532 INFO Fetching http://169.254.169.254/latest/meta-data/instance-type: Attempt #1 May 15 17:29:00.547378 coreos-metadata[1331]: May 15 17:29:00.546 INFO Fetch successful May 15 17:29:00.547946 coreos-metadata[1331]: May 15 17:29:00.547 INFO Fetching http://169.254.169.254/latest/meta-data/local-ipv4: Attempt #1 May 15 17:29:00.562034 coreos-metadata[1331]: May 15 17:29:00.561 INFO Fetch successful May 15 17:29:00.562399 coreos-metadata[1331]: May 15 17:29:00.562 INFO Fetching http://169.254.169.254/latest/meta-data/public-ipv4: Attempt #1 May 15 17:29:00.576491 coreos-metadata[1331]: May 15 17:29:00.576 INFO Fetch successful May 15 17:29:00.598711 systemd[1]: Finished coreos-metadata.service. May 15 17:29:00.599000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:29:00.618210 kernel: audit: type=1130 audit(1747330140.599:232): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:29:01.921327 systemd[1]: Stopped kubelet.service. May 15 17:29:01.942003 kernel: audit: type=1130 audit(1747330141.921:233): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:29:01.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:29:01.940432 systemd[1]: Starting kubelet.service... May 15 17:29:01.922000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:29:01.958135 kernel: audit: type=1131 audit(1747330141.922:234): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:29:01.997279 systemd[1]: Reloading. May 15 17:29:02.142789 /usr/lib/systemd/system-generators/torcx-generator[1398]: time="2025-05-15T17:29:02Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 17:29:02.144314 /usr/lib/systemd/system-generators/torcx-generator[1398]: time="2025-05-15T17:29:02Z" level=info msg="torcx already run" May 15 17:29:02.426882 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 17:29:02.427181 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 17:29:02.456567 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 17:29:02.572366 kernel: audit: type=1400 audit(1747330142.561:235): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.572552 kernel: audit: type=1400 audit(1747330142.561:236): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.577342 kernel: audit: type=1400 audit(1747330142.561:237): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.571000 audit: BPF prog-id=46 op=LOAD May 15 17:29:02.571000 audit: BPF prog-id=41 op=UNLOAD May 15 17:29:02.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.576000 audit: BPF prog-id=47 op=LOAD May 15 17:29:02.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.576000 audit: BPF prog-id=48 op=LOAD May 15 17:29:02.576000 audit: BPF prog-id=42 op=UNLOAD May 15 17:29:02.576000 audit: BPF prog-id=43 op=UNLOAD May 15 17:29:02.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.581000 audit: BPF prog-id=49 op=LOAD May 15 17:29:02.581000 audit: BPF prog-id=30 op=UNLOAD May 15 17:29:02.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.583000 audit: BPF prog-id=50 op=LOAD May 15 17:29:02.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.583000 audit: BPF prog-id=51 op=LOAD May 15 17:29:02.583000 audit: BPF prog-id=31 op=UNLOAD May 15 17:29:02.583000 audit: BPF prog-id=32 op=UNLOAD May 15 17:29:02.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.594000 audit: BPF prog-id=52 op=LOAD May 15 17:29:02.594000 audit: BPF prog-id=33 op=UNLOAD May 15 17:29:02.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.594000 audit: BPF prog-id=53 op=LOAD May 15 17:29:02.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.594000 audit: BPF prog-id=54 op=LOAD May 15 17:29:02.594000 audit: BPF prog-id=34 op=UNLOAD May 15 17:29:02.594000 audit: BPF prog-id=35 op=UNLOAD May 15 17:29:02.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.602000 audit: BPF prog-id=55 op=LOAD May 15 17:29:02.602000 audit: BPF prog-id=44 op=UNLOAD May 15 17:29:02.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.608000 audit: BPF prog-id=56 op=LOAD May 15 17:29:02.608000 audit: BPF prog-id=40 op=UNLOAD May 15 17:29:02.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.610000 audit: BPF prog-id=57 op=LOAD May 15 17:29:02.610000 audit: BPF prog-id=39 op=UNLOAD May 15 17:29:02.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.613000 audit: BPF prog-id=58 op=LOAD May 15 17:29:02.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.613000 audit: BPF prog-id=59 op=LOAD May 15 17:29:02.613000 audit: BPF prog-id=36 op=UNLOAD May 15 17:29:02.613000 audit: BPF prog-id=37 op=UNLOAD May 15 17:29:02.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:02.617000 audit: BPF prog-id=60 op=LOAD May 15 17:29:02.617000 audit: BPF prog-id=38 op=UNLOAD May 15 17:29:02.647000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:29:02.648154 systemd[1]: Started kubelet.service. May 15 17:29:02.655649 systemd[1]: Stopping kubelet.service... May 15 17:29:02.656278 systemd[1]: kubelet.service: Deactivated successfully. May 15 17:29:02.656474 systemd[1]: Stopped kubelet.service. May 15 17:29:02.655000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:29:02.658915 systemd[1]: Starting kubelet.service... May 15 17:29:02.770491 systemd[1]: Started kubelet.service. May 15 17:29:02.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:29:03.165013 kubelet[1449]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 17:29:03.165868 kubelet[1449]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 15 17:29:03.165868 kubelet[1449]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 17:29:03.169036 kubelet[1449]: I0515 17:29:03.168870 1449 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 15 17:29:03.555143 kubelet[1449]: I0515 17:29:03.554978 1449 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" May 15 17:29:03.555936 kubelet[1449]: I0515 17:29:03.555875 1449 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 15 17:29:03.557026 kubelet[1449]: I0515 17:29:03.556982 1449 server.go:929] "Client rotation is on, will bootstrap in background" May 15 17:29:03.615266 kubelet[1449]: I0515 17:29:03.615208 1449 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 15 17:29:03.632675 kubelet[1449]: E0515 17:29:03.632496 1449 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 15 17:29:03.632675 kubelet[1449]: I0515 17:29:03.632551 1449 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 15 17:29:03.648290 kubelet[1449]: I0515 17:29:03.648182 1449 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 15 17:29:03.648631 kubelet[1449]: I0515 17:29:03.648356 1449 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" May 15 17:29:03.648631 kubelet[1449]: I0515 17:29:03.648547 1449 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 15 17:29:03.648915 kubelet[1449]: I0515 17:29:03.648614 1449 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"172.24.4.218","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 15 17:29:03.648915 kubelet[1449]: I0515 17:29:03.648889 1449 topology_manager.go:138] "Creating topology manager with none policy" May 15 17:29:03.648915 kubelet[1449]: I0515 17:29:03.648909 1449 container_manager_linux.go:300] "Creating device plugin manager" May 15 17:29:03.649928 kubelet[1449]: I0515 17:29:03.649121 1449 state_mem.go:36] "Initialized new in-memory state store" May 15 17:29:03.656964 kubelet[1449]: I0515 17:29:03.656870 1449 kubelet.go:408] "Attempting to sync node with API server" May 15 17:29:03.656964 kubelet[1449]: I0515 17:29:03.656909 1449 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" May 15 17:29:03.656964 kubelet[1449]: I0515 17:29:03.656960 1449 kubelet.go:314] "Adding apiserver pod source" May 15 17:29:03.657248 kubelet[1449]: I0515 17:29:03.656996 1449 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 15 17:29:03.657248 kubelet[1449]: E0515 17:29:03.657051 1449 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:03.657248 kubelet[1449]: E0515 17:29:03.657074 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:03.669318 kubelet[1449]: I0515 17:29:03.669174 1449 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 15 17:29:03.673061 kubelet[1449]: I0515 17:29:03.672978 1449 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 15 17:29:03.673341 kubelet[1449]: W0515 17:29:03.673236 1449 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 15 17:29:03.675174 kubelet[1449]: I0515 17:29:03.674515 1449 server.go:1269] "Started kubelet" May 15 17:29:03.698000 audit[1449]: AVC avc: denied { mac_admin } for pid=1449 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:03.698000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 17:29:03.698000 audit[1449]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000989260 a1=c000866c90 a2=c000989230 a3=25 items=0 ppid=1 pid=1449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:03.698000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 17:29:03.699968 kubelet[1449]: I0515 17:29:03.699930 1449 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 15 17:29:03.698000 audit[1449]: AVC avc: denied { mac_admin } for pid=1449 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:03.698000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 17:29:03.698000 audit[1449]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008f37c0 a1=c000866ca8 a2=c0009892f0 a3=25 items=0 ppid=1 pid=1449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:03.698000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 17:29:03.700489 kubelet[1449]: I0515 17:29:03.700465 1449 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 15 17:29:03.700745 kubelet[1449]: I0515 17:29:03.700724 1449 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 15 17:29:03.712509 kubelet[1449]: I0515 17:29:03.712468 1449 volume_manager.go:289] "Starting Kubelet Volume Manager" May 15 17:29:03.713715 kubelet[1449]: I0515 17:29:03.713679 1449 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 15 17:29:03.713958 kubelet[1449]: I0515 17:29:03.712947 1449 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 15 17:29:03.714432 kubelet[1449]: I0515 17:29:03.714410 1449 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 15 17:29:03.715165 kubelet[1449]: E0515 17:29:03.715140 1449 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 15 17:29:03.717051 kubelet[1449]: E0515 17:29:03.717031 1449 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.24.4.218\" not found" May 15 17:29:03.718867 kubelet[1449]: I0515 17:29:03.718841 1449 factory.go:221] Registration of the systemd container factory successfully May 15 17:29:03.719274 kubelet[1449]: I0515 17:29:03.719244 1449 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 15 17:29:03.720895 kubelet[1449]: I0515 17:29:03.719260 1449 desired_state_of_world_populator.go:146] "Desired state populator starts to run" May 15 17:29:03.721914 kubelet[1449]: I0515 17:29:03.712859 1449 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 15 17:29:03.724356 kubelet[1449]: I0515 17:29:03.724316 1449 reconciler.go:26] "Reconciler: start to sync state" May 15 17:29:03.726397 kubelet[1449]: I0515 17:29:03.726377 1449 server.go:460] "Adding debug handlers to kubelet server" May 15 17:29:03.731651 kubelet[1449]: I0515 17:29:03.731621 1449 factory.go:221] Registration of the containerd container factory successfully May 15 17:29:03.736408 kubelet[1449]: E0515 17:29:03.736371 1449 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"172.24.4.218\" not found" node="172.24.4.218" May 15 17:29:03.766479 kubelet[1449]: I0515 17:29:03.766454 1449 cpu_manager.go:214] "Starting CPU manager" policy="none" May 15 17:29:03.766670 kubelet[1449]: I0515 17:29:03.766620 1449 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 15 17:29:03.766781 kubelet[1449]: I0515 17:29:03.766768 1449 state_mem.go:36] "Initialized new in-memory state store" May 15 17:29:03.775904 kubelet[1449]: I0515 17:29:03.775860 1449 policy_none.go:49] "None policy: Start" May 15 17:29:03.776840 kubelet[1449]: I0515 17:29:03.776821 1449 memory_manager.go:170] "Starting memorymanager" policy="None" May 15 17:29:03.776904 kubelet[1449]: I0515 17:29:03.776865 1449 state_mem.go:35] "Initializing new in-memory state store" May 15 17:29:03.789267 systemd[1]: Created slice kubepods.slice. May 15 17:29:03.809485 systemd[1]: Created slice kubepods-burstable.slice. May 15 17:29:03.816685 systemd[1]: Created slice kubepods-besteffort.slice. May 15 17:29:03.817473 kubelet[1449]: E0515 17:29:03.817456 1449 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.24.4.218\" not found" May 15 17:29:03.817000 audit[1463]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1463 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:29:03.817000 audit[1463]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe6f5c6f30 a2=0 a3=7ffe6f5c6f1c items=0 ppid=1449 pid=1463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:03.817000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 15 17:29:03.818000 audit[1468]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1468 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:29:03.818000 audit[1468]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffc2d894550 a2=0 a3=7ffc2d89453c items=0 ppid=1449 pid=1468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:03.818000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 15 17:29:03.823236 kubelet[1449]: I0515 17:29:03.823213 1449 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 15 17:29:03.822000 audit[1449]: AVC avc: denied { mac_admin } for pid=1449 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:03.822000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 17:29:03.822000 audit[1449]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b30e70 a1=c000d78888 a2=c000b30e40 a3=25 items=0 ppid=1 pid=1449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:03.822000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 17:29:03.823840 kubelet[1449]: I0515 17:29:03.823810 1449 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 15 17:29:03.824132 kubelet[1449]: I0515 17:29:03.824111 1449 eviction_manager.go:189] "Eviction manager: starting control loop" May 15 17:29:03.824286 kubelet[1449]: I0515 17:29:03.824229 1449 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 15 17:29:03.826540 kubelet[1449]: I0515 17:29:03.826503 1449 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 15 17:29:03.829254 kubelet[1449]: E0515 17:29:03.828646 1449 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"172.24.4.218\" not found" May 15 17:29:03.824000 audit[1470]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1470 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:29:03.824000 audit[1470]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd7bfad140 a2=0 a3=7ffd7bfad12c items=0 ppid=1449 pid=1470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:03.824000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 17:29:03.849000 audit[1475]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1475 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:29:03.849000 audit[1475]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff4fcbc4f0 a2=0 a3=7fff4fcbc4dc items=0 ppid=1449 pid=1475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:03.849000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 17:29:03.923000 audit[1480]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1480 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:29:03.923000 audit[1480]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fffb11d79f0 a2=0 a3=7fffb11d79dc items=0 ppid=1449 pid=1480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:03.923000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 15 17:29:03.926591 kubelet[1449]: I0515 17:29:03.926530 1449 kubelet_node_status.go:72] "Attempting to register node" node="172.24.4.218" May 15 17:29:03.928453 kubelet[1449]: I0515 17:29:03.928352 1449 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 15 17:29:03.929000 audit[1482]: NETFILTER_CFG table=mangle:7 family=2 entries=1 op=nft_register_chain pid=1482 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:29:03.929000 audit[1482]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff3c6226a0 a2=0 a3=7fff3c62268c items=0 ppid=1449 pid=1482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:03.929000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 15 17:29:03.931000 audit[1483]: NETFILTER_CFG table=nat:8 family=2 entries=2 op=nft_register_chain pid=1483 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:29:03.931000 audit[1483]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff367721f0 a2=0 a3=7fff367721dc items=0 ppid=1449 pid=1483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:03.931000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 15 17:29:03.934000 audit[1484]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_chain pid=1484 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:29:03.934000 audit[1484]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffea7121bc0 a2=0 a3=7ffea7121bac items=0 ppid=1449 pid=1484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:03.934000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 15 17:29:03.936000 audit[1481]: NETFILTER_CFG table=mangle:10 family=10 entries=2 op=nft_register_chain pid=1481 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:29:03.936000 audit[1481]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd63e434f0 a2=0 a3=7ffd63e434dc items=0 ppid=1449 pid=1481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:03.936000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 15 17:29:03.938919 kubelet[1449]: I0515 17:29:03.938866 1449 kubelet_node_status.go:75] "Successfully registered node" node="172.24.4.218" May 15 17:29:03.939184 kubelet[1449]: I0515 17:29:03.939152 1449 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 15 17:29:03.939338 kubelet[1449]: I0515 17:29:03.939319 1449 status_manager.go:217] "Starting to sync pod status with apiserver" May 15 17:29:03.939820 kubelet[1449]: I0515 17:29:03.939784 1449 kubelet.go:2321] "Starting kubelet main sync loop" May 15 17:29:03.940161 kubelet[1449]: E0515 17:29:03.940139 1449 kubelet.go:2345] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" May 15 17:29:03.943000 audit[1485]: NETFILTER_CFG table=mangle:11 family=10 entries=1 op=nft_register_chain pid=1485 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:29:03.943000 audit[1485]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff63bdf340 a2=0 a3=7fff63bdf32c items=0 ppid=1449 pid=1485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:03.943000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 15 17:29:03.947000 audit[1486]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=1486 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:29:03.947000 audit[1486]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe0e00f1c0 a2=0 a3=7ffe0e00f1ac items=0 ppid=1449 pid=1486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:03.947000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 15 17:29:03.950000 audit[1487]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1487 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:29:03.950000 audit[1487]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd02a7b060 a2=0 a3=7ffd02a7b04c items=0 ppid=1449 pid=1487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:03.950000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 15 17:29:04.085611 kubelet[1449]: I0515 17:29:04.084307 1449 kuberuntime_manager.go:1633] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" May 15 17:29:04.085912 env[1153]: time="2025-05-15T17:29:04.085286328Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 15 17:29:04.087747 kubelet[1449]: I0515 17:29:04.087404 1449 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" May 15 17:29:04.340276 sudo[1327]: pam_unix(sudo:session): session closed for user root May 15 17:29:04.340000 audit[1327]: USER_END pid=1327 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 17:29:04.341000 audit[1327]: CRED_DISP pid=1327 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 17:29:04.560192 kubelet[1449]: I0515 17:29:04.560052 1449 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" May 15 17:29:04.562567 kubelet[1449]: W0515 17:29:04.562487 1449 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 15 17:29:04.562962 kubelet[1449]: W0515 17:29:04.562626 1449 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.Service ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 15 17:29:04.563357 kubelet[1449]: W0515 17:29:04.562739 1449 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.CSIDriver ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 15 17:29:04.613719 sshd[1323]: pam_unix(sshd:session): session closed for user core May 15 17:29:04.618000 audit[1323]: USER_END pid=1323 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 17:29:04.618000 audit[1323]: CRED_DISP pid=1323 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 15 17:29:04.622620 systemd[1]: sshd@8-172.24.4.218:22-172.24.4.1:48732.service: Deactivated successfully. May 15 17:29:04.622000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.218:22-172.24.4.1:48732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 17:29:04.624566 systemd[1]: session-9.scope: Deactivated successfully. May 15 17:29:04.624872 systemd[1]: session-9.scope: Consumed 1.159s CPU time. May 15 17:29:04.627652 systemd-logind[1145]: Session 9 logged out. Waiting for processes to exit. May 15 17:29:04.630259 systemd-logind[1145]: Removed session 9. May 15 17:29:04.658060 kubelet[1449]: I0515 17:29:04.658005 1449 apiserver.go:52] "Watching apiserver" May 15 17:29:04.658978 kubelet[1449]: E0515 17:29:04.658150 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:04.675750 kubelet[1449]: E0515 17:29:04.674783 1449 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7mk6b" podUID="a2c6d92b-36a3-4601-a9d0-56c12423f442" May 15 17:29:04.698910 systemd[1]: Created slice kubepods-besteffort-pod325c8bb5_a52e_4bdd_b339_38e76dee571a.slice. May 15 17:29:04.749950 kubelet[1449]: I0515 17:29:04.749184 1449 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" May 15 17:29:04.766192 systemd[1]: Created slice kubepods-besteffort-pod28f90c32_993a_46bd_9d4f_2ed543b064fb.slice. May 15 17:29:04.847349 kubelet[1449]: I0515 17:29:04.847064 1449 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/28f90c32-993a-46bd-9d4f-2ed543b064fb-kube-proxy\") pod \"kube-proxy-wgpfm\" (UID: \"28f90c32-993a-46bd-9d4f-2ed543b064fb\") " pod="kube-system/kube-proxy-wgpfm" May 15 17:29:04.847631 kubelet[1449]: I0515 17:29:04.847404 1449 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/28f90c32-993a-46bd-9d4f-2ed543b064fb-xtables-lock\") pod \"kube-proxy-wgpfm\" (UID: \"28f90c32-993a-46bd-9d4f-2ed543b064fb\") " pod="kube-system/kube-proxy-wgpfm" May 15 17:29:04.847631 kubelet[1449]: I0515 17:29:04.847502 1449 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/28f90c32-993a-46bd-9d4f-2ed543b064fb-lib-modules\") pod \"kube-proxy-wgpfm\" (UID: \"28f90c32-993a-46bd-9d4f-2ed543b064fb\") " pod="kube-system/kube-proxy-wgpfm" May 15 17:29:04.847917 kubelet[1449]: I0515 17:29:04.847595 1449 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7rwlc\" (UniqueName: \"kubernetes.io/projected/28f90c32-993a-46bd-9d4f-2ed543b064fb-kube-api-access-7rwlc\") pod \"kube-proxy-wgpfm\" (UID: \"28f90c32-993a-46bd-9d4f-2ed543b064fb\") " pod="kube-system/kube-proxy-wgpfm" May 15 17:29:04.847917 kubelet[1449]: I0515 17:29:04.847699 1449 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/325c8bb5-a52e-4bdd-b339-38e76dee571a-policysync\") pod \"calico-node-hhp82\" (UID: \"325c8bb5-a52e-4bdd-b339-38e76dee571a\") " pod="calico-system/calico-node-hhp82" May 15 17:29:04.847917 kubelet[1449]: I0515 17:29:04.847785 1449 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/325c8bb5-a52e-4bdd-b339-38e76dee571a-tigera-ca-bundle\") pod \"calico-node-hhp82\" (UID: \"325c8bb5-a52e-4bdd-b339-38e76dee571a\") " pod="calico-system/calico-node-hhp82" May 15 17:29:04.848402 kubelet[1449]: I0515 17:29:04.848047 1449 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/325c8bb5-a52e-4bdd-b339-38e76dee571a-node-certs\") pod \"calico-node-hhp82\" (UID: \"325c8bb5-a52e-4bdd-b339-38e76dee571a\") " pod="calico-system/calico-node-hhp82" May 15 17:29:04.848402 kubelet[1449]: I0515 17:29:04.848159 1449 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/a2c6d92b-36a3-4601-a9d0-56c12423f442-varrun\") pod \"csi-node-driver-7mk6b\" (UID: \"a2c6d92b-36a3-4601-a9d0-56c12423f442\") " pod="calico-system/csi-node-driver-7mk6b" May 15 17:29:04.848402 kubelet[1449]: I0515 17:29:04.848255 1449 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/325c8bb5-a52e-4bdd-b339-38e76dee571a-cni-net-dir\") pod \"calico-node-hhp82\" (UID: \"325c8bb5-a52e-4bdd-b339-38e76dee571a\") " pod="calico-system/calico-node-hhp82" May 15 17:29:04.848402 kubelet[1449]: I0515 17:29:04.848345 1449 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/325c8bb5-a52e-4bdd-b339-38e76dee571a-cni-log-dir\") pod \"calico-node-hhp82\" (UID: \"325c8bb5-a52e-4bdd-b339-38e76dee571a\") " pod="calico-system/calico-node-hhp82" May 15 17:29:04.848758 kubelet[1449]: I0515 17:29:04.848430 1449 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/325c8bb5-a52e-4bdd-b339-38e76dee571a-flexvol-driver-host\") pod \"calico-node-hhp82\" (UID: \"325c8bb5-a52e-4bdd-b339-38e76dee571a\") " pod="calico-system/calico-node-hhp82" May 15 17:29:04.848758 kubelet[1449]: I0515 17:29:04.848478 1449 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/325c8bb5-a52e-4bdd-b339-38e76dee571a-cni-bin-dir\") pod \"calico-node-hhp82\" (UID: \"325c8bb5-a52e-4bdd-b339-38e76dee571a\") " pod="calico-system/calico-node-hhp82" May 15 17:29:04.848758 kubelet[1449]: I0515 17:29:04.848563 1449 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/a2c6d92b-36a3-4601-a9d0-56c12423f442-registration-dir\") pod \"csi-node-driver-7mk6b\" (UID: \"a2c6d92b-36a3-4601-a9d0-56c12423f442\") " pod="calico-system/csi-node-driver-7mk6b" May 15 17:29:04.848758 kubelet[1449]: I0515 17:29:04.848647 1449 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/a2c6d92b-36a3-4601-a9d0-56c12423f442-kubelet-dir\") pod \"csi-node-driver-7mk6b\" (UID: \"a2c6d92b-36a3-4601-a9d0-56c12423f442\") " pod="calico-system/csi-node-driver-7mk6b" May 15 17:29:04.848758 kubelet[1449]: I0515 17:29:04.848734 1449 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/325c8bb5-a52e-4bdd-b339-38e76dee571a-var-lib-calico\") pod \"calico-node-hhp82\" (UID: \"325c8bb5-a52e-4bdd-b339-38e76dee571a\") " pod="calico-system/calico-node-hhp82" May 15 17:29:04.849135 kubelet[1449]: I0515 17:29:04.848782 1449 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-l662s\" (UniqueName: \"kubernetes.io/projected/325c8bb5-a52e-4bdd-b339-38e76dee571a-kube-api-access-l662s\") pod \"calico-node-hhp82\" (UID: \"325c8bb5-a52e-4bdd-b339-38e76dee571a\") " pod="calico-system/calico-node-hhp82" May 15 17:29:04.849135 kubelet[1449]: I0515 17:29:04.848870 1449 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/a2c6d92b-36a3-4601-a9d0-56c12423f442-socket-dir\") pod \"csi-node-driver-7mk6b\" (UID: \"a2c6d92b-36a3-4601-a9d0-56c12423f442\") " pod="calico-system/csi-node-driver-7mk6b" May 15 17:29:04.849135 kubelet[1449]: I0515 17:29:04.848963 1449 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/325c8bb5-a52e-4bdd-b339-38e76dee571a-lib-modules\") pod \"calico-node-hhp82\" (UID: \"325c8bb5-a52e-4bdd-b339-38e76dee571a\") " pod="calico-system/calico-node-hhp82" May 15 17:29:04.849135 kubelet[1449]: I0515 17:29:04.849044 1449 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/325c8bb5-a52e-4bdd-b339-38e76dee571a-xtables-lock\") pod \"calico-node-hhp82\" (UID: \"325c8bb5-a52e-4bdd-b339-38e76dee571a\") " pod="calico-system/calico-node-hhp82" May 15 17:29:04.849406 kubelet[1449]: I0515 17:29:04.849139 1449 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/325c8bb5-a52e-4bdd-b339-38e76dee571a-var-run-calico\") pod \"calico-node-hhp82\" (UID: \"325c8bb5-a52e-4bdd-b339-38e76dee571a\") " pod="calico-system/calico-node-hhp82" May 15 17:29:04.849406 kubelet[1449]: I0515 17:29:04.849231 1449 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jvlpm\" (UniqueName: \"kubernetes.io/projected/a2c6d92b-36a3-4601-a9d0-56c12423f442-kube-api-access-jvlpm\") pod \"csi-node-driver-7mk6b\" (UID: \"a2c6d92b-36a3-4601-a9d0-56c12423f442\") " pod="calico-system/csi-node-driver-7mk6b" May 15 17:29:04.966020 kubelet[1449]: E0515 17:29:04.961792 1449 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:29:04.966020 kubelet[1449]: W0515 17:29:04.962067 1449 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:29:04.966020 kubelet[1449]: E0515 17:29:04.963473 1449 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:29:04.966020 kubelet[1449]: E0515 17:29:04.964379 1449 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:29:04.966020 kubelet[1449]: W0515 17:29:04.964406 1449 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:29:04.966020 kubelet[1449]: E0515 17:29:04.964432 1449 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:29:04.966020 kubelet[1449]: E0515 17:29:04.965548 1449 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:29:04.966020 kubelet[1449]: W0515 17:29:04.965585 1449 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:29:04.966020 kubelet[1449]: E0515 17:29:04.965622 1449 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:29:04.970247 kubelet[1449]: E0515 17:29:04.966639 1449 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:29:04.970247 kubelet[1449]: W0515 17:29:04.966682 1449 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:29:04.970247 kubelet[1449]: E0515 17:29:04.966734 1449 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:29:04.971389 kubelet[1449]: E0515 17:29:04.971299 1449 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:29:04.971389 kubelet[1449]: W0515 17:29:04.971353 1449 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:29:04.971389 kubelet[1449]: E0515 17:29:04.971391 1449 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:29:04.972482 kubelet[1449]: E0515 17:29:04.972401 1449 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:29:04.972482 kubelet[1449]: W0515 17:29:04.972451 1449 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:29:04.972482 kubelet[1449]: E0515 17:29:04.972486 1449 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:29:04.973188 kubelet[1449]: E0515 17:29:04.972996 1449 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:29:04.973188 kubelet[1449]: W0515 17:29:04.973041 1449 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:29:04.973188 kubelet[1449]: E0515 17:29:04.973079 1449 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:29:04.973708 kubelet[1449]: E0515 17:29:04.973561 1449 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:29:04.973708 kubelet[1449]: W0515 17:29:04.973582 1449 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:29:04.973708 kubelet[1449]: E0515 17:29:04.973605 1449 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:29:04.975231 kubelet[1449]: E0515 17:29:04.974614 1449 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:29:04.975231 kubelet[1449]: W0515 17:29:04.974664 1449 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:29:04.975231 kubelet[1449]: E0515 17:29:04.974700 1449 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:29:04.975815 kubelet[1449]: E0515 17:29:04.975722 1449 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:29:04.975815 kubelet[1449]: W0515 17:29:04.975769 1449 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:29:04.975815 kubelet[1449]: E0515 17:29:04.975812 1449 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:29:04.977185 kubelet[1449]: E0515 17:29:04.976726 1449 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:29:04.977185 kubelet[1449]: W0515 17:29:04.976778 1449 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:29:04.977185 kubelet[1449]: E0515 17:29:04.976825 1449 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:29:04.977690 kubelet[1449]: E0515 17:29:04.977499 1449 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:29:04.977690 kubelet[1449]: W0515 17:29:04.977539 1449 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:29:04.977690 kubelet[1449]: E0515 17:29:04.977578 1449 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:29:04.978804 kubelet[1449]: E0515 17:29:04.978222 1449 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:29:04.978804 kubelet[1449]: W0515 17:29:04.978277 1449 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:29:04.978804 kubelet[1449]: E0515 17:29:04.978325 1449 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:29:04.979918 kubelet[1449]: E0515 17:29:04.979194 1449 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:29:04.979918 kubelet[1449]: W0515 17:29:04.979262 1449 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:29:04.979918 kubelet[1449]: E0515 17:29:04.979306 1449 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:29:04.981371 kubelet[1449]: I0515 17:29:04.981189 1449 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 15 17:29:04.991984 kubelet[1449]: E0515 17:29:04.991925 1449 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:29:04.991984 kubelet[1449]: W0515 17:29:04.991969 1449 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:29:04.998018 kubelet[1449]: E0515 17:29:04.997954 1449 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:29:04.998408 kubelet[1449]: E0515 17:29:04.997883 1449 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:29:04.998408 kubelet[1449]: W0515 17:29:04.998370 1449 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:29:05.020205 kubelet[1449]: E0515 17:29:05.017332 1449 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:29:05.020205 kubelet[1449]: W0515 17:29:05.017398 1449 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:29:05.020205 kubelet[1449]: E0515 17:29:05.017450 1449 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:29:05.028385 kubelet[1449]: E0515 17:29:05.028346 1449 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:29:05.028385 kubelet[1449]: W0515 17:29:05.028369 1449 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:29:05.028385 kubelet[1449]: E0515 17:29:05.028386 1449 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:29:05.028622 kubelet[1449]: E0515 17:29:05.028439 1449 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:29:05.028725 kubelet[1449]: E0515 17:29:05.028696 1449 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:29:05.028725 kubelet[1449]: W0515 17:29:05.028715 1449 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:29:05.028834 kubelet[1449]: E0515 17:29:05.028733 1449 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:29:05.028962 kubelet[1449]: E0515 17:29:05.028934 1449 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:29:05.028962 kubelet[1449]: W0515 17:29:05.028951 1449 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:29:05.029072 kubelet[1449]: E0515 17:29:05.028964 1449 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:29:05.029264 kubelet[1449]: E0515 17:29:05.029236 1449 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:29:05.029264 kubelet[1449]: W0515 17:29:05.029257 1449 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:29:05.029386 kubelet[1449]: E0515 17:29:05.029270 1449 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:29:05.029871 kubelet[1449]: E0515 17:29:05.029833 1449 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:29:05.029871 kubelet[1449]: W0515 17:29:05.029849 1449 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:29:05.029871 kubelet[1449]: E0515 17:29:05.029859 1449 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:29:05.040627 kubelet[1449]: E0515 17:29:05.040582 1449 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:29:05.040627 kubelet[1449]: W0515 17:29:05.040603 1449 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:29:05.040627 kubelet[1449]: E0515 17:29:05.040624 1449 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:29:05.042227 kubelet[1449]: E0515 17:29:05.042195 1449 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 17:29:05.042332 kubelet[1449]: W0515 17:29:05.042315 1449 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 17:29:05.042448 kubelet[1449]: E0515 17:29:05.042431 1449 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 17:29:05.069623 env[1153]: time="2025-05-15T17:29:05.069531602Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-hhp82,Uid:325c8bb5-a52e-4bdd-b339-38e76dee571a,Namespace:calico-system,Attempt:0,}" May 15 17:29:05.073137 env[1153]: time="2025-05-15T17:29:05.073053488Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-wgpfm,Uid:28f90c32-993a-46bd-9d4f-2ed543b064fb,Namespace:kube-system,Attempt:0,}" May 15 17:29:05.660537 kubelet[1449]: E0515 17:29:05.660401 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:05.944430 kubelet[1449]: E0515 17:29:05.941947 1449 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7mk6b" podUID="a2c6d92b-36a3-4601-a9d0-56c12423f442" May 15 17:29:06.074361 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3877020818.mount: Deactivated successfully. May 15 17:29:06.094280 env[1153]: time="2025-05-15T17:29:06.094128875Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:29:06.098020 env[1153]: time="2025-05-15T17:29:06.097964023Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:29:06.103735 env[1153]: time="2025-05-15T17:29:06.103608086Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:29:06.113251 env[1153]: time="2025-05-15T17:29:06.113077957Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:29:06.120269 env[1153]: time="2025-05-15T17:29:06.120162246Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:29:06.125918 env[1153]: time="2025-05-15T17:29:06.125849672Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:29:06.132069 env[1153]: time="2025-05-15T17:29:06.132002451Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:29:06.136831 env[1153]: time="2025-05-15T17:29:06.136772104Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:29:06.215335 env[1153]: time="2025-05-15T17:29:06.215146332Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 17:29:06.215335 env[1153]: time="2025-05-15T17:29:06.215261934Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 17:29:06.215743 env[1153]: time="2025-05-15T17:29:06.215674978Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 17:29:06.216383 env[1153]: time="2025-05-15T17:29:06.216292023Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c2295653c87a59326863c01a2e358b9a5936e46eee517135585e73cd10e02978 pid=1534 runtime=io.containerd.runc.v2 May 15 17:29:06.222843 env[1153]: time="2025-05-15T17:29:06.222590734Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 17:29:06.222843 env[1153]: time="2025-05-15T17:29:06.222639457Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 17:29:06.222843 env[1153]: time="2025-05-15T17:29:06.222654186Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 17:29:06.223464 env[1153]: time="2025-05-15T17:29:06.223199062Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c5ad48a270282e92d082175fc569ef7dd5f885fdeb5767a7c9acfe380106298b pid=1533 runtime=io.containerd.runc.v2 May 15 17:29:06.250732 systemd[1]: Started cri-containerd-c2295653c87a59326863c01a2e358b9a5936e46eee517135585e73cd10e02978.scope. May 15 17:29:06.269046 systemd[1]: Started cri-containerd-c5ad48a270282e92d082175fc569ef7dd5f885fdeb5767a7c9acfe380106298b.scope. May 15 17:29:06.303712 kernel: kauditd_printk_skb: 225 callbacks suppressed May 15 17:29:06.304054 kernel: audit: type=1400 audit(1747330146.294:430): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.313189 kernel: audit: type=1400 audit(1747330146.294:431): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.319198 kernel: audit: type=1400 audit(1747330146.294:432): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.334020 kernel: audit: type=1400 audit(1747330146.294:433): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.334119 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 15 17:29:06.334196 kernel: audit: type=1400 audit(1747330146.294:434): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.334229 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 May 15 17:29:06.334262 kernel: audit: type=1400 audit(1747330146.294:435): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.334294 kernel: audit: backlog limit exceeded May 15 17:29:06.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.346460 kernel: audit: type=1400 audit(1747330146.294:436): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.295000 audit: BPF prog-id=61 op=LOAD May 15 17:29:06.305000 audit[1559]: AVC avc: denied { bpf } for pid=1559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.305000 audit[1559]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1533 pid=1559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:06.305000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335616434386132373032383265393264303832313735666335363965 May 15 17:29:06.305000 audit[1559]: AVC avc: denied { perfmon } for pid=1559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.305000 audit[1559]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1533 pid=1559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:06.305000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335616434386132373032383265393264303832313735666335363965 May 15 17:29:06.306000 audit[1559]: AVC avc: denied { bpf } for pid=1559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.306000 audit[1559]: AVC avc: denied { bpf } for pid=1559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.306000 audit[1559]: AVC avc: denied { bpf } for pid=1559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.306000 audit[1559]: AVC avc: denied { perfmon } for pid=1559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.306000 audit[1559]: AVC avc: denied { perfmon } for pid=1559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.306000 audit[1559]: AVC avc: denied { perfmon } for pid=1559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.306000 audit[1559]: AVC avc: denied { perfmon } for pid=1559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.306000 audit[1559]: AVC avc: denied { perfmon } for pid=1559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.306000 audit[1559]: AVC avc: denied { bpf } for pid=1559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.306000 audit[1559]: AVC avc: denied { bpf } for pid=1559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.306000 audit: BPF prog-id=62 op=LOAD May 15 17:29:06.306000 audit[1559]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000255ce0 items=0 ppid=1533 pid=1559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:06.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335616434386132373032383265393264303832313735666335363965 May 15 17:29:06.312000 audit[1559]: AVC avc: denied { bpf } for pid=1559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.312000 audit[1559]: AVC avc: denied { bpf } for pid=1559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.312000 audit[1559]: AVC avc: denied { perfmon } for pid=1559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.312000 audit[1559]: AVC avc: denied { perfmon } for pid=1559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.312000 audit[1559]: AVC avc: denied { perfmon } for pid=1559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.312000 audit[1559]: AVC avc: denied { perfmon } for pid=1559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.312000 audit[1559]: AVC avc: denied { perfmon } for pid=1559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.312000 audit[1559]: AVC avc: denied { bpf } for pid=1559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.312000 audit[1559]: AVC avc: denied { bpf } for pid=1559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.312000 audit: BPF prog-id=63 op=LOAD May 15 17:29:06.312000 audit[1559]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000255d28 items=0 ppid=1533 pid=1559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:06.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335616434386132373032383265393264303832313735666335363965 May 15 17:29:06.312000 audit: BPF prog-id=63 op=UNLOAD May 15 17:29:06.312000 audit: BPF prog-id=62 op=UNLOAD May 15 17:29:06.312000 audit[1559]: AVC avc: denied { bpf } for pid=1559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.312000 audit[1559]: AVC avc: denied { bpf } for pid=1559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.312000 audit[1559]: AVC avc: denied { bpf } for pid=1559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.312000 audit[1559]: AVC avc: denied { perfmon } for pid=1559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.312000 audit[1559]: AVC avc: denied { perfmon } for pid=1559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.312000 audit[1559]: AVC avc: denied { perfmon } for pid=1559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.312000 audit[1559]: AVC avc: denied { perfmon } for pid=1559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.312000 audit[1559]: AVC avc: denied { perfmon } for pid=1559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.312000 audit[1559]: AVC avc: denied { bpf } for pid=1559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.312000 audit[1559]: AVC avc: denied { bpf } for pid=1559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.312000 audit: BPF prog-id=64 op=LOAD May 15 17:29:06.312000 audit[1559]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003be138 items=0 ppid=1533 pid=1559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:06.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335616434386132373032383265393264303832313735666335363965 May 15 17:29:06.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.340000 audit: BPF prog-id=65 op=LOAD May 15 17:29:06.340000 audit[1551]: AVC avc: denied { bpf } for pid=1551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.340000 audit[1551]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00020e820 items=0 ppid=1534 pid=1551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:06.340000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332323935363533633837613539333236383633633031613265333538 May 15 17:29:06.349000 audit[1551]: AVC avc: denied { bpf } for pid=1551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.349000 audit[1551]: AVC avc: denied { bpf } for pid=1551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.349000 audit[1551]: AVC avc: denied { perfmon } for pid=1551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.349000 audit[1551]: AVC avc: denied { perfmon } for pid=1551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.349000 audit[1551]: AVC avc: denied { perfmon } for pid=1551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.349000 audit[1551]: AVC avc: denied { perfmon } for pid=1551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.349000 audit[1551]: AVC avc: denied { perfmon } for pid=1551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.349000 audit[1551]: AVC avc: denied { bpf } for pid=1551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.349000 audit[1551]: AVC avc: denied { bpf } for pid=1551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.349000 audit: BPF prog-id=67 op=LOAD May 15 17:29:06.349000 audit[1551]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00020e868 items=0 ppid=1534 pid=1551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:06.349000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332323935363533633837613539333236383633633031613265333538 May 15 17:29:06.350000 audit: BPF prog-id=67 op=UNLOAD May 15 17:29:06.350000 audit: BPF prog-id=66 op=UNLOAD May 15 17:29:06.350000 audit[1551]: AVC avc: denied { bpf } for pid=1551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.350000 audit[1551]: AVC avc: denied { bpf } for pid=1551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.350000 audit[1551]: AVC avc: denied { bpf } for pid=1551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.350000 audit[1551]: AVC avc: denied { perfmon } for pid=1551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.350000 audit[1551]: AVC avc: denied { perfmon } for pid=1551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.350000 audit[1551]: AVC avc: denied { perfmon } for pid=1551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.350000 audit[1551]: AVC avc: denied { perfmon } for pid=1551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.350000 audit[1551]: AVC avc: denied { perfmon } for pid=1551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.350000 audit[1551]: AVC avc: denied { bpf } for pid=1551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.350000 audit[1551]: AVC avc: denied { bpf } for pid=1551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:06.350000 audit: BPF prog-id=68 op=LOAD May 15 17:29:06.350000 audit[1551]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00020ec78 items=0 ppid=1534 pid=1551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:06.350000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332323935363533633837613539333236383633633031613265333538 May 15 17:29:06.376629 env[1153]: time="2025-05-15T17:29:06.376562926Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-hhp82,Uid:325c8bb5-a52e-4bdd-b339-38e76dee571a,Namespace:calico-system,Attempt:0,} returns sandbox id \"c2295653c87a59326863c01a2e358b9a5936e46eee517135585e73cd10e02978\"" May 15 17:29:06.381039 env[1153]: time="2025-05-15T17:29:06.380970083Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-wgpfm,Uid:28f90c32-993a-46bd-9d4f-2ed543b064fb,Namespace:kube-system,Attempt:0,} returns sandbox id \"c5ad48a270282e92d082175fc569ef7dd5f885fdeb5767a7c9acfe380106298b\"" May 15 17:29:06.383389 env[1153]: time="2025-05-15T17:29:06.383361476Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 15 17:29:06.662360 kubelet[1449]: E0515 17:29:06.661206 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:07.662913 kubelet[1449]: E0515 17:29:07.662722 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:07.945121 kubelet[1449]: E0515 17:29:07.944021 1449 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7mk6b" podUID="a2c6d92b-36a3-4601-a9d0-56c12423f442" May 15 17:29:08.467899 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount590176689.mount: Deactivated successfully. May 15 17:29:08.658015 env[1153]: time="2025-05-15T17:29:08.657884535Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:29:08.662998 env[1153]: time="2025-05-15T17:29:08.662953616Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:29:08.663759 kubelet[1449]: E0515 17:29:08.663665 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:08.667826 env[1153]: time="2025-05-15T17:29:08.667747779Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:29:08.670362 env[1153]: time="2025-05-15T17:29:08.670299677Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:29:08.671752 env[1153]: time="2025-05-15T17:29:08.671699168Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5\"" May 15 17:29:08.674694 env[1153]: time="2025-05-15T17:29:08.674645481Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.8\"" May 15 17:29:08.688788 env[1153]: time="2025-05-15T17:29:08.688720652Z" level=info msg="CreateContainer within sandbox \"c2295653c87a59326863c01a2e358b9a5936e46eee517135585e73cd10e02978\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 15 17:29:08.716081 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2434746933.mount: Deactivated successfully. May 15 17:29:08.725460 env[1153]: time="2025-05-15T17:29:08.724550535Z" level=info msg="CreateContainer within sandbox \"c2295653c87a59326863c01a2e358b9a5936e46eee517135585e73cd10e02978\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"68dda3f717e5abb5286f0d3a72751a27a87d6c424d893f09350dce427f57e1f9\"" May 15 17:29:08.726979 env[1153]: time="2025-05-15T17:29:08.726920665Z" level=info msg="StartContainer for \"68dda3f717e5abb5286f0d3a72751a27a87d6c424d893f09350dce427f57e1f9\"" May 15 17:29:08.765680 systemd[1]: Started cri-containerd-68dda3f717e5abb5286f0d3a72751a27a87d6c424d893f09350dce427f57e1f9.scope. May 15 17:29:08.794000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:08.794000 audit[1609]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7faf9434acb8 items=0 ppid=1534 pid=1609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:08.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638646461336637313765356162623532383666306433613732373531 May 15 17:29:08.794000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:08.794000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:08.794000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:08.794000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:08.794000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:08.794000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:08.794000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:08.794000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:08.794000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:08.794000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:08.794000 audit: BPF prog-id=69 op=LOAD May 15 17:29:08.794000 audit[1609]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001b6548 items=0 ppid=1534 pid=1609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:08.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638646461336637313765356162623532383666306433613732373531 May 15 17:29:08.794000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:08.794000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:08.794000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:08.794000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:08.794000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:08.794000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:08.794000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:08.794000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:08.794000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:08.794000 audit: BPF prog-id=70 op=LOAD May 15 17:29:08.794000 audit[1609]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001b6598 items=0 ppid=1534 pid=1609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:08.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638646461336637313765356162623532383666306433613732373531 May 15 17:29:08.794000 audit: BPF prog-id=70 op=UNLOAD May 15 17:29:08.794000 audit: BPF prog-id=69 op=UNLOAD May 15 17:29:08.794000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:08.794000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:08.794000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:08.794000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:08.794000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:08.794000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:08.794000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:08.794000 audit[1609]: AVC avc: denied { perfmon } for pid=1609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:08.794000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:08.794000 audit[1609]: AVC avc: denied { bpf } for pid=1609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:08.794000 audit: BPF prog-id=71 op=LOAD May 15 17:29:08.794000 audit[1609]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001b6628 items=0 ppid=1534 pid=1609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:08.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638646461336637313765356162623532383666306433613732373531 May 15 17:29:08.817610 env[1153]: time="2025-05-15T17:29:08.817554334Z" level=info msg="StartContainer for \"68dda3f717e5abb5286f0d3a72751a27a87d6c424d893f09350dce427f57e1f9\" returns successfully" May 15 17:29:08.833697 systemd[1]: cri-containerd-68dda3f717e5abb5286f0d3a72751a27a87d6c424d893f09350dce427f57e1f9.scope: Deactivated successfully. May 15 17:29:08.836000 audit: BPF prog-id=71 op=UNLOAD May 15 17:29:08.964566 env[1153]: time="2025-05-15T17:29:08.964439825Z" level=info msg="shim disconnected" id=68dda3f717e5abb5286f0d3a72751a27a87d6c424d893f09350dce427f57e1f9 May 15 17:29:08.965218 env[1153]: time="2025-05-15T17:29:08.965164914Z" level=warning msg="cleaning up after shim disconnected" id=68dda3f717e5abb5286f0d3a72751a27a87d6c424d893f09350dce427f57e1f9 namespace=k8s.io May 15 17:29:08.965448 env[1153]: time="2025-05-15T17:29:08.965406426Z" level=info msg="cleaning up dead shim" May 15 17:29:09.005246 env[1153]: time="2025-05-15T17:29:09.003879966Z" level=warning msg="cleanup warnings time=\"2025-05-15T17:29:08Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1647 runtime=io.containerd.runc.v2\n" May 15 17:29:09.409006 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-68dda3f717e5abb5286f0d3a72751a27a87d6c424d893f09350dce427f57e1f9-rootfs.mount: Deactivated successfully. May 15 17:29:09.664432 kubelet[1449]: E0515 17:29:09.664163 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:09.944278 kubelet[1449]: E0515 17:29:09.943927 1449 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7mk6b" podUID="a2c6d92b-36a3-4601-a9d0-56c12423f442" May 15 17:29:10.021812 update_engine[1147]: I0515 17:29:10.021606 1147 update_attempter.cc:509] Updating boot flags... May 15 17:29:10.485479 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount49634583.mount: Deactivated successfully. May 15 17:29:10.664728 kubelet[1449]: E0515 17:29:10.664635 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:11.435555 env[1153]: time="2025-05-15T17:29:11.435344777Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:29:11.438735 env[1153]: time="2025-05-15T17:29:11.438660506Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d73f013cedcf301aef42272c93e4c1174dab1a8eccd96840091ef04b63480f2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:29:11.443163 env[1153]: time="2025-05-15T17:29:11.443045645Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:29:11.446666 env[1153]: time="2025-05-15T17:29:11.446615077Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:dd0c9a37670f209947b1ed880f06a2e93e1d41da78c037f52f94b13858769838,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:29:11.448462 env[1153]: time="2025-05-15T17:29:11.448347854Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.8\" returns image reference \"sha256:7d73f013cedcf301aef42272c93e4c1174dab1a8eccd96840091ef04b63480f2\"" May 15 17:29:11.452138 env[1153]: time="2025-05-15T17:29:11.452065599Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 15 17:29:11.460810 env[1153]: time="2025-05-15T17:29:11.460723242Z" level=info msg="CreateContainer within sandbox \"c5ad48a270282e92d082175fc569ef7dd5f885fdeb5767a7c9acfe380106298b\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 15 17:29:11.505836 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3425500595.mount: Deactivated successfully. May 15 17:29:11.512981 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2932552272.mount: Deactivated successfully. May 15 17:29:11.529904 env[1153]: time="2025-05-15T17:29:11.529804130Z" level=info msg="CreateContainer within sandbox \"c5ad48a270282e92d082175fc569ef7dd5f885fdeb5767a7c9acfe380106298b\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"0e5ffc1a87eea7bdb62673e4315be9adff5f263c7fe51c7011af35e3b437f701\"" May 15 17:29:11.531442 env[1153]: time="2025-05-15T17:29:11.531363977Z" level=info msg="StartContainer for \"0e5ffc1a87eea7bdb62673e4315be9adff5f263c7fe51c7011af35e3b437f701\"" May 15 17:29:11.580332 systemd[1]: Started cri-containerd-0e5ffc1a87eea7bdb62673e4315be9adff5f263c7fe51c7011af35e3b437f701.scope. May 15 17:29:11.612127 kernel: kauditd_printk_skb: 170 callbacks suppressed May 15 17:29:11.612347 kernel: audit: type=1400 audit(1747330151.604:470): avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:11.604000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:11.604000 audit[1687]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f2c7c68b968 items=0 ppid=1533 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:11.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065356666633161383765656137626462363236373365343331356265 May 15 17:29:11.626922 kernel: audit: type=1300 audit(1747330151.604:470): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f2c7c68b968 items=0 ppid=1533 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:11.627066 kernel: audit: type=1327 audit(1747330151.604:470): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065356666633161383765656137626462363236373365343331356265 May 15 17:29:11.627179 kernel: audit: type=1400 audit(1747330151.611:471): avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:11.611000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:11.611000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:11.636297 kernel: audit: type=1400 audit(1747330151.611:471): avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:11.611000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:11.611000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:11.647401 kernel: audit: type=1400 audit(1747330151.611:471): avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:11.647475 kernel: audit: type=1400 audit(1747330151.611:471): avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:11.611000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:11.654251 kernel: audit: type=1400 audit(1747330151.611:471): avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:11.611000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:11.658543 env[1153]: time="2025-05-15T17:29:11.658485824Z" level=info msg="StartContainer for \"0e5ffc1a87eea7bdb62673e4315be9adff5f263c7fe51c7011af35e3b437f701\" returns successfully" May 15 17:29:11.663115 kernel: audit: type=1400 audit(1747330151.611:471): avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:11.665524 kubelet[1449]: E0515 17:29:11.665446 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:11.611000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:11.671169 kernel: audit: type=1400 audit(1747330151.611:471): avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:11.611000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:11.611000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:11.611000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:11.611000 audit: BPF prog-id=72 op=LOAD May 15 17:29:11.611000 audit[1687]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000340c08 items=0 ppid=1533 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:11.611000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065356666633161383765656137626462363236373365343331356265 May 15 17:29:11.611000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:11.611000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:11.611000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:11.611000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:11.611000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:11.611000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:11.611000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:11.611000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:11.611000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:11.611000 audit: BPF prog-id=73 op=LOAD May 15 17:29:11.611000 audit[1687]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000340c58 items=0 ppid=1533 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:11.611000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065356666633161383765656137626462363236373365343331356265 May 15 17:29:11.611000 audit: BPF prog-id=73 op=UNLOAD May 15 17:29:11.611000 audit: BPF prog-id=72 op=UNLOAD May 15 17:29:11.611000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:11.611000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:11.611000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:11.611000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:11.611000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:11.611000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:11.611000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:11.611000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:11.611000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:11.611000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:11.611000 audit: BPF prog-id=74 op=LOAD May 15 17:29:11.611000 audit[1687]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000340ce8 items=0 ppid=1533 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:11.611000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065356666633161383765656137626462363236373365343331356265 May 15 17:29:11.845000 audit[1744]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1744 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:29:11.845000 audit[1744]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc367464b0 a2=0 a3=7ffc3674649c items=0 ppid=1697 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:11.845000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 15 17:29:11.849000 audit[1745]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1745 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:29:11.849000 audit[1745]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc60f9dda0 a2=0 a3=7ffc60f9dd8c items=0 ppid=1697 pid=1745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:11.849000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 15 17:29:11.852000 audit[1746]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=1746 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:29:11.852000 audit[1746]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdedfe66d0 a2=0 a3=7ffdedfe66bc items=0 ppid=1697 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:11.852000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 15 17:29:11.853000 audit[1747]: NETFILTER_CFG table=nat:17 family=10 entries=1 op=nft_register_chain pid=1747 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:29:11.853000 audit[1747]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdaf2c2fb0 a2=0 a3=7ffdaf2c2f9c items=0 ppid=1697 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:11.853000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 15 17:29:11.857000 audit[1748]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=1748 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:29:11.857000 audit[1748]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeeb05f060 a2=0 a3=7ffeeb05f04c items=0 ppid=1697 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:11.857000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 15 17:29:11.857000 audit[1749]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1749 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:29:11.857000 audit[1749]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd75c6e810 a2=0 a3=7ffd75c6e7fc items=0 ppid=1697 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:11.857000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 15 17:29:11.943948 kubelet[1449]: E0515 17:29:11.942475 1449 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7mk6b" podUID="a2c6d92b-36a3-4601-a9d0-56c12423f442" May 15 17:29:11.963000 audit[1750]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1750 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:29:11.963000 audit[1750]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffcb6edd280 a2=0 a3=7ffcb6edd26c items=0 ppid=1697 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:11.963000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 15 17:29:11.971000 audit[1752]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1752 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:29:11.971000 audit[1752]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe18a12db0 a2=0 a3=7ffe18a12d9c items=0 ppid=1697 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:11.971000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 15 17:29:11.987000 audit[1755]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1755 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:29:11.987000 audit[1755]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffddb8cf7f0 a2=0 a3=7ffddb8cf7dc items=0 ppid=1697 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:11.987000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 15 17:29:11.994000 audit[1756]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1756 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:29:11.994000 audit[1756]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc853e9d90 a2=0 a3=7ffc853e9d7c items=0 ppid=1697 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:11.994000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 15 17:29:12.004000 audit[1758]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1758 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:29:12.004000 audit[1758]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe730e1560 a2=0 a3=7ffe730e154c items=0 ppid=1697 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:12.004000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 15 17:29:12.007000 audit[1759]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1759 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:29:12.007000 audit[1759]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe12202ec0 a2=0 a3=7ffe12202eac items=0 ppid=1697 pid=1759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:12.007000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 15 17:29:12.016000 audit[1761]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1761 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:29:12.016000 audit[1761]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff79718f10 a2=0 a3=7fff79718efc items=0 ppid=1697 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:12.016000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 15 17:29:12.025000 audit[1764]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1764 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:29:12.025000 audit[1764]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff7faeeed0 a2=0 a3=7fff7faeeebc items=0 ppid=1697 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:12.025000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 15 17:29:12.029000 audit[1765]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1765 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:29:12.029000 audit[1765]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd32519b40 a2=0 a3=7ffd32519b2c items=0 ppid=1697 pid=1765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:12.029000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 15 17:29:12.035000 audit[1767]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1767 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:29:12.035000 audit[1767]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc980f8bf0 a2=0 a3=7ffc980f8bdc items=0 ppid=1697 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:12.035000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 15 17:29:12.038000 audit[1768]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1768 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:29:12.038000 audit[1768]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff3d91c960 a2=0 a3=7fff3d91c94c items=0 ppid=1697 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:12.038000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 15 17:29:12.044000 audit[1770]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1770 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:29:12.044000 audit[1770]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffedbd86440 a2=0 a3=7ffedbd8642c items=0 ppid=1697 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:12.044000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 17:29:12.053000 audit[1773]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1773 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:29:12.053000 audit[1773]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe43db2a30 a2=0 a3=7ffe43db2a1c items=0 ppid=1697 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:12.053000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 17:29:12.063000 audit[1776]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1776 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:29:12.063000 audit[1776]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffd7161d60 a2=0 a3=7fffd7161d4c items=0 ppid=1697 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:12.063000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 15 17:29:12.066000 audit[1777]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1777 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:29:12.066000 audit[1777]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffef6783ad0 a2=0 a3=7ffef6783abc items=0 ppid=1697 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:12.066000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 15 17:29:12.069000 audit[1779]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1779 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:29:12.069000 audit[1779]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fffd2c8a880 a2=0 a3=7fffd2c8a86c items=0 ppid=1697 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:12.069000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 17:29:12.100000 audit[1783]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1783 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:29:12.100000 audit[1783]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd3d63da90 a2=0 a3=7ffd3d63da7c items=0 ppid=1697 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:12.100000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 17:29:12.104000 audit[1784]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1784 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:29:12.104000 audit[1784]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe25d661c0 a2=0 a3=7ffe25d661ac items=0 ppid=1697 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:12.104000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 15 17:29:12.108000 audit[1786]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1786 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 17:29:12.108000 audit[1786]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd34063500 a2=0 a3=7ffd340634ec items=0 ppid=1697 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:12.108000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 15 17:29:12.141000 audit[1792]: NETFILTER_CFG table=filter:39 family=2 entries=5 op=nft_register_rule pid=1792 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 17:29:12.141000 audit[1792]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffc8f693230 a2=0 a3=7ffc8f69321c items=0 ppid=1697 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:12.141000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 17:29:12.201000 audit[1792]: NETFILTER_CFG table=nat:40 family=2 entries=65 op=nft_register_chain pid=1792 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 17:29:12.201000 audit[1792]: SYSCALL arch=c000003e syscall=46 success=yes exit=30940 a0=3 a1=7ffc8f693230 a2=0 a3=7ffc8f69321c items=0 ppid=1697 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:12.201000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 17:29:12.226000 audit[1801]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1801 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:29:12.226000 audit[1801]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc2b584d90 a2=0 a3=7ffc2b584d7c items=0 ppid=1697 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:12.226000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 15 17:29:12.230000 audit[1803]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1803 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:29:12.230000 audit[1803]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff81cc6860 a2=0 a3=7fff81cc684c items=0 ppid=1697 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:12.230000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 15 17:29:12.236000 audit[1806]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1806 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:29:12.236000 audit[1806]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc7c1e1920 a2=0 a3=7ffc7c1e190c items=0 ppid=1697 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:12.236000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 15 17:29:12.238000 audit[1807]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1807 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:29:12.238000 audit[1807]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff4632ae30 a2=0 a3=7fff4632ae1c items=0 ppid=1697 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:12.238000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 15 17:29:12.242000 audit[1809]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1809 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:29:12.242000 audit[1809]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe7192e400 a2=0 a3=7ffe7192e3ec items=0 ppid=1697 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:12.242000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 15 17:29:12.243000 audit[1810]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1810 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:29:12.243000 audit[1810]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe1776e980 a2=0 a3=7ffe1776e96c items=0 ppid=1697 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:12.243000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 15 17:29:12.246000 audit[1812]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1812 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:29:12.246000 audit[1812]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffff02def90 a2=0 a3=7ffff02def7c items=0 ppid=1697 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:12.246000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 15 17:29:12.251000 audit[1815]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1815 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:29:12.251000 audit[1815]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd63f06610 a2=0 a3=7ffd63f065fc items=0 ppid=1697 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:12.251000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 15 17:29:12.252000 audit[1816]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1816 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:29:12.252000 audit[1816]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdc6c1d500 a2=0 a3=7ffdc6c1d4ec items=0 ppid=1697 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:12.252000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 15 17:29:12.257000 audit[1818]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1818 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:29:12.257000 audit[1818]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffebe3c01b0 a2=0 a3=7ffebe3c019c items=0 ppid=1697 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:12.257000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 15 17:29:12.259000 audit[1819]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1819 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:29:12.259000 audit[1819]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffee75b8090 a2=0 a3=7ffee75b807c items=0 ppid=1697 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:12.259000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 15 17:29:12.262000 audit[1821]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1821 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:29:12.262000 audit[1821]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff2b44dce0 a2=0 a3=7fff2b44dccc items=0 ppid=1697 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:12.262000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 17:29:12.266000 audit[1824]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1824 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:29:12.266000 audit[1824]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd35545140 a2=0 a3=7ffd3554512c items=0 ppid=1697 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:12.266000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 15 17:29:12.271000 audit[1827]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1827 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:29:12.271000 audit[1827]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd60e8cd50 a2=0 a3=7ffd60e8cd3c items=0 ppid=1697 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:12.271000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 15 17:29:12.273000 audit[1828]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1828 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:29:12.273000 audit[1828]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdbf0e3f30 a2=0 a3=7ffdbf0e3f1c items=0 ppid=1697 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:12.273000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 15 17:29:12.276000 audit[1830]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1830 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:29:12.276000 audit[1830]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffeccb76df0 a2=0 a3=7ffeccb76ddc items=0 ppid=1697 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:12.276000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 17:29:12.280000 audit[1833]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1833 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:29:12.280000 audit[1833]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffcd37c2290 a2=0 a3=7ffcd37c227c items=0 ppid=1697 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:12.280000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 17:29:12.282000 audit[1834]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1834 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:29:12.282000 audit[1834]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffebdae9c40 a2=0 a3=7ffebdae9c2c items=0 ppid=1697 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:12.282000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 15 17:29:12.285000 audit[1836]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1836 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:29:12.285000 audit[1836]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd8246ed80 a2=0 a3=7ffd8246ed6c items=0 ppid=1697 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:12.285000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 15 17:29:12.287000 audit[1837]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1837 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:29:12.287000 audit[1837]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffc8fa81d0 a2=0 a3=7fffc8fa81bc items=0 ppid=1697 pid=1837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:12.287000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 15 17:29:12.290000 audit[1839]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1839 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:29:12.290000 audit[1839]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd20c8f280 a2=0 a3=7ffd20c8f26c items=0 ppid=1697 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:12.290000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 17:29:12.295000 audit[1842]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1842 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 17:29:12.295000 audit[1842]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffda894fb50 a2=0 a3=7ffda894fb3c items=0 ppid=1697 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:12.295000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 17:29:12.299000 audit[1844]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1844 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 15 17:29:12.299000 audit[1844]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffcae18bf90 a2=0 a3=7ffcae18bf7c items=0 ppid=1697 pid=1844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:12.299000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 17:29:12.300000 audit[1844]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1844 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 15 17:29:12.300000 audit[1844]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffcae18bf90 a2=0 a3=7ffcae18bf7c items=0 ppid=1697 pid=1844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:12.300000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 17:29:12.666658 kubelet[1449]: E0515 17:29:12.666601 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:13.667968 kubelet[1449]: E0515 17:29:13.667885 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:13.941983 kubelet[1449]: E0515 17:29:13.941765 1449 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7mk6b" podUID="a2c6d92b-36a3-4601-a9d0-56c12423f442" May 15 17:29:14.669361 kubelet[1449]: E0515 17:29:14.668864 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:15.670999 kubelet[1449]: E0515 17:29:15.670707 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:15.947943 kubelet[1449]: E0515 17:29:15.945401 1449 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7mk6b" podUID="a2c6d92b-36a3-4601-a9d0-56c12423f442" May 15 17:29:16.671182 kubelet[1449]: E0515 17:29:16.671121 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:17.672376 kubelet[1449]: E0515 17:29:17.672238 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:17.942514 kubelet[1449]: E0515 17:29:17.941759 1449 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7mk6b" podUID="a2c6d92b-36a3-4601-a9d0-56c12423f442" May 15 17:29:18.673985 kubelet[1449]: E0515 17:29:18.673823 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:18.712773 env[1153]: time="2025-05-15T17:29:18.712529814Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:29:18.716143 env[1153]: time="2025-05-15T17:29:18.716067234Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:29:18.719829 env[1153]: time="2025-05-15T17:29:18.719767280Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:29:18.724487 env[1153]: time="2025-05-15T17:29:18.724424673Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:29:18.724775 env[1153]: time="2025-05-15T17:29:18.724701007Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9\"" May 15 17:29:18.732163 env[1153]: time="2025-05-15T17:29:18.732043371Z" level=info msg="CreateContainer within sandbox \"c2295653c87a59326863c01a2e358b9a5936e46eee517135585e73cd10e02978\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 15 17:29:18.775930 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3322004018.mount: Deactivated successfully. May 15 17:29:18.782462 env[1153]: time="2025-05-15T17:29:18.782310663Z" level=info msg="CreateContainer within sandbox \"c2295653c87a59326863c01a2e358b9a5936e46eee517135585e73cd10e02978\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"cffaba670531b5895999a58be8535474b4391664fd5a32c04107f07ee80f5f83\"" May 15 17:29:18.784263 env[1153]: time="2025-05-15T17:29:18.784200457Z" level=info msg="StartContainer for \"cffaba670531b5895999a58be8535474b4391664fd5a32c04107f07ee80f5f83\"" May 15 17:29:18.840603 systemd[1]: Started cri-containerd-cffaba670531b5895999a58be8535474b4391664fd5a32c04107f07ee80f5f83.scope. May 15 17:29:18.868926 kernel: kauditd_printk_skb: 186 callbacks suppressed May 15 17:29:18.869192 kernel: audit: type=1400 audit(1747330158.861:527): avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:18.876506 kernel: audit: type=1300 audit(1747330158.861:527): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7fab4c54ac28 items=0 ppid=1534 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:18.861000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:18.861000 audit[1852]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7fab4c54ac28 items=0 ppid=1534 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:18.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366666162613637303533316235383935393939613538626538353335 May 15 17:29:18.884113 kernel: audit: type=1327 audit(1747330158.861:527): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366666162613637303533316235383935393939613538626538353335 May 15 17:29:18.865000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:18.865000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:18.893608 kernel: audit: type=1400 audit(1747330158.865:528): avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:18.893675 kernel: audit: type=1400 audit(1747330158.865:528): avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:18.893718 kernel: audit: type=1400 audit(1747330158.865:528): avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:18.865000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:18.865000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:18.903265 kernel: audit: type=1400 audit(1747330158.865:528): avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:18.865000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:18.865000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:18.913909 kernel: audit: type=1400 audit(1747330158.865:528): avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:18.914104 kernel: audit: type=1400 audit(1747330158.865:528): avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:18.914134 kernel: audit: type=1400 audit(1747330158.865:528): avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:18.865000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:18.865000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:18.865000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:18.865000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:18.865000 audit: BPF prog-id=75 op=LOAD May 15 17:29:18.865000 audit[1852]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0001b73c8 items=0 ppid=1534 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:18.865000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366666162613637303533316235383935393939613538626538353335 May 15 17:29:18.868000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:18.868000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:18.868000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:18.868000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:18.868000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:18.868000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:18.868000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:18.868000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:18.868000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:18.868000 audit: BPF prog-id=76 op=LOAD May 15 17:29:18.868000 audit[1852]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0001b7418 items=0 ppid=1534 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:18.868000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366666162613637303533316235383935393939613538626538353335 May 15 17:29:18.875000 audit: BPF prog-id=76 op=UNLOAD May 15 17:29:18.875000 audit: BPF prog-id=75 op=UNLOAD May 15 17:29:18.876000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:18.876000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:18.876000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:18.876000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:18.876000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:18.876000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:18.876000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:18.876000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:18.876000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:18.876000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:18.876000 audit: BPF prog-id=77 op=LOAD May 15 17:29:18.876000 audit[1852]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0001b74a8 items=0 ppid=1534 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:18.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366666162613637303533316235383935393939613538626538353335 May 15 17:29:18.929295 env[1153]: time="2025-05-15T17:29:18.926897800Z" level=info msg="StartContainer for \"cffaba670531b5895999a58be8535474b4391664fd5a32c04107f07ee80f5f83\" returns successfully" May 15 17:29:19.125610 kubelet[1449]: I0515 17:29:19.125453 1449 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-wgpfm" podStartSLOduration=11.057147021 podStartE2EDuration="16.125395324s" podCreationTimestamp="2025-05-15 17:29:03 +0000 UTC" firstStartedPulling="2025-05-15 17:29:06.382454074 +0000 UTC m=+3.587608988" lastFinishedPulling="2025-05-15 17:29:11.450702327 +0000 UTC m=+8.655857291" observedRunningTime="2025-05-15 17:29:12.014933915 +0000 UTC m=+9.220088959" watchObservedRunningTime="2025-05-15 17:29:19.125395324 +0000 UTC m=+16.330550238" May 15 17:29:19.675251 kubelet[1449]: E0515 17:29:19.675203 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:19.942270 kubelet[1449]: E0515 17:29:19.942006 1449 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7mk6b" podUID="a2c6d92b-36a3-4601-a9d0-56c12423f442" May 15 17:29:20.676886 kubelet[1449]: E0515 17:29:20.676780 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:20.770608 env[1153]: time="2025-05-15T17:29:20.770416214Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 15 17:29:20.775828 systemd[1]: cri-containerd-cffaba670531b5895999a58be8535474b4391664fd5a32c04107f07ee80f5f83.scope: Deactivated successfully. May 15 17:29:20.780000 audit: BPF prog-id=77 op=UNLOAD May 15 17:29:20.792340 kubelet[1449]: I0515 17:29:20.791953 1449 kubelet_node_status.go:488] "Fast updating node status as it just became ready" May 15 17:29:20.849218 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-cffaba670531b5895999a58be8535474b4391664fd5a32c04107f07ee80f5f83-rootfs.mount: Deactivated successfully. May 15 17:29:21.677739 kubelet[1449]: E0515 17:29:21.677665 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:21.816253 env[1153]: time="2025-05-15T17:29:21.816124001Z" level=info msg="shim disconnected" id=cffaba670531b5895999a58be8535474b4391664fd5a32c04107f07ee80f5f83 May 15 17:29:21.817122 env[1153]: time="2025-05-15T17:29:21.817028353Z" level=warning msg="cleaning up after shim disconnected" id=cffaba670531b5895999a58be8535474b4391664fd5a32c04107f07ee80f5f83 namespace=k8s.io May 15 17:29:21.817365 env[1153]: time="2025-05-15T17:29:21.817321648Z" level=info msg="cleaning up dead shim" May 15 17:29:21.839570 env[1153]: time="2025-05-15T17:29:21.839436497Z" level=warning msg="cleanup warnings time=\"2025-05-15T17:29:21Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1891 runtime=io.containerd.runc.v2\n" May 15 17:29:21.953221 systemd[1]: Created slice kubepods-besteffort-poda2c6d92b_36a3_4601_a9d0_56c12423f442.slice. May 15 17:29:21.960523 env[1153]: time="2025-05-15T17:29:21.960435202Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7mk6b,Uid:a2c6d92b-36a3-4601-a9d0-56c12423f442,Namespace:calico-system,Attempt:0,}" May 15 17:29:22.033739 env[1153]: time="2025-05-15T17:29:22.033635338Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 15 17:29:22.101876 env[1153]: time="2025-05-15T17:29:22.101718472Z" level=error msg="Failed to destroy network for sandbox \"04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 17:29:22.103772 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7-shm.mount: Deactivated successfully. May 15 17:29:22.105883 env[1153]: time="2025-05-15T17:29:22.105803690Z" level=error msg="encountered an error cleaning up failed sandbox \"04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 17:29:22.106176 env[1153]: time="2025-05-15T17:29:22.106061338Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7mk6b,Uid:a2c6d92b-36a3-4601-a9d0-56c12423f442,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 17:29:22.107018 kubelet[1449]: E0515 17:29:22.106956 1449 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 17:29:22.107261 kubelet[1449]: E0515 17:29:22.107198 1449 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-7mk6b" May 15 17:29:22.107334 kubelet[1449]: E0515 17:29:22.107295 1449 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-7mk6b" May 15 17:29:22.107480 kubelet[1449]: E0515 17:29:22.107396 1449 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-7mk6b_calico-system(a2c6d92b-36a3-4601-a9d0-56c12423f442)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-7mk6b_calico-system(a2c6d92b-36a3-4601-a9d0-56c12423f442)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-7mk6b" podUID="a2c6d92b-36a3-4601-a9d0-56c12423f442" May 15 17:29:22.679729 kubelet[1449]: E0515 17:29:22.679617 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:23.037227 kubelet[1449]: I0515 17:29:23.037152 1449 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7" May 15 17:29:23.039288 env[1153]: time="2025-05-15T17:29:23.039211748Z" level=info msg="StopPodSandbox for \"04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7\"" May 15 17:29:23.113791 env[1153]: time="2025-05-15T17:29:23.113528199Z" level=error msg="StopPodSandbox for \"04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7\" failed" error="failed to destroy network for sandbox \"04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 17:29:23.114896 kubelet[1449]: E0515 17:29:23.114418 1449 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7" May 15 17:29:23.114896 kubelet[1449]: E0515 17:29:23.114549 1449 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7"} May 15 17:29:23.114896 kubelet[1449]: E0515 17:29:23.114729 1449 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a2c6d92b-36a3-4601-a9d0-56c12423f442\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 17:29:23.114896 kubelet[1449]: E0515 17:29:23.114791 1449 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a2c6d92b-36a3-4601-a9d0-56c12423f442\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-7mk6b" podUID="a2c6d92b-36a3-4601-a9d0-56c12423f442" May 15 17:29:23.563966 systemd[1]: Created slice kubepods-besteffort-pod70454114_2fbd_4caf_8b7d_ec037621b9c6.slice. May 15 17:29:23.633923 kubelet[1449]: I0515 17:29:23.633845 1449 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-k8skx\" (UniqueName: \"kubernetes.io/projected/70454114-2fbd-4caf-8b7d-ec037621b9c6-kube-api-access-k8skx\") pod \"nginx-deployment-8587fbcb89-97phk\" (UID: \"70454114-2fbd-4caf-8b7d-ec037621b9c6\") " pod="default/nginx-deployment-8587fbcb89-97phk" May 15 17:29:23.658213 kubelet[1449]: E0515 17:29:23.658079 1449 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:23.680431 kubelet[1449]: E0515 17:29:23.680373 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:23.872916 env[1153]: time="2025-05-15T17:29:23.872411024Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-97phk,Uid:70454114-2fbd-4caf-8b7d-ec037621b9c6,Namespace:default,Attempt:0,}" May 15 17:29:24.012980 env[1153]: time="2025-05-15T17:29:24.012913912Z" level=error msg="Failed to destroy network for sandbox \"77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 17:29:24.015066 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54-shm.mount: Deactivated successfully. May 15 17:29:24.015409 env[1153]: time="2025-05-15T17:29:24.015361347Z" level=error msg="encountered an error cleaning up failed sandbox \"77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 17:29:24.015571 env[1153]: time="2025-05-15T17:29:24.015526900Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-97phk,Uid:70454114-2fbd-4caf-8b7d-ec037621b9c6,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 17:29:24.016565 kubelet[1449]: E0515 17:29:24.015912 1449 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 17:29:24.016565 kubelet[1449]: E0515 17:29:24.016016 1449 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-97phk" May 15 17:29:24.016565 kubelet[1449]: E0515 17:29:24.016059 1449 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-97phk" May 15 17:29:24.016710 kubelet[1449]: E0515 17:29:24.016148 1449 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-8587fbcb89-97phk_default(70454114-2fbd-4caf-8b7d-ec037621b9c6)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-8587fbcb89-97phk_default(70454114-2fbd-4caf-8b7d-ec037621b9c6)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-97phk" podUID="70454114-2fbd-4caf-8b7d-ec037621b9c6" May 15 17:29:24.058356 kubelet[1449]: I0515 17:29:24.039501 1449 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54" May 15 17:29:24.063137 env[1153]: time="2025-05-15T17:29:24.062901915Z" level=info msg="StopPodSandbox for \"77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54\"" May 15 17:29:24.130126 env[1153]: time="2025-05-15T17:29:24.128149217Z" level=error msg="StopPodSandbox for \"77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54\" failed" error="failed to destroy network for sandbox \"77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 17:29:24.130266 kubelet[1449]: E0515 17:29:24.128593 1449 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54" May 15 17:29:24.130266 kubelet[1449]: E0515 17:29:24.128702 1449 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54"} May 15 17:29:24.130266 kubelet[1449]: E0515 17:29:24.128811 1449 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"70454114-2fbd-4caf-8b7d-ec037621b9c6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 17:29:24.130266 kubelet[1449]: E0515 17:29:24.128866 1449 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"70454114-2fbd-4caf-8b7d-ec037621b9c6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-97phk" podUID="70454114-2fbd-4caf-8b7d-ec037621b9c6" May 15 17:29:24.682267 kubelet[1449]: E0515 17:29:24.682141 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:25.683771 kubelet[1449]: E0515 17:29:25.683565 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:26.684557 kubelet[1449]: E0515 17:29:26.684479 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:27.684874 kubelet[1449]: E0515 17:29:27.684776 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:28.686115 kubelet[1449]: E0515 17:29:28.685739 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:29.686514 kubelet[1449]: E0515 17:29:29.686355 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:30.686808 kubelet[1449]: E0515 17:29:30.686694 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:31.687126 kubelet[1449]: E0515 17:29:31.687051 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:32.688263 kubelet[1449]: E0515 17:29:32.688171 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:33.250873 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1077403561.mount: Deactivated successfully. May 15 17:29:33.301175 env[1153]: time="2025-05-15T17:29:33.301030079Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:29:33.306323 env[1153]: time="2025-05-15T17:29:33.306295036Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:29:33.309570 env[1153]: time="2025-05-15T17:29:33.309512085Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:29:33.312299 env[1153]: time="2025-05-15T17:29:33.312237829Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:29:33.312921 env[1153]: time="2025-05-15T17:29:33.312877223Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae\"" May 15 17:29:33.341098 env[1153]: time="2025-05-15T17:29:33.341001565Z" level=info msg="CreateContainer within sandbox \"c2295653c87a59326863c01a2e358b9a5936e46eee517135585e73cd10e02978\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 15 17:29:33.367948 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2359543625.mount: Deactivated successfully. May 15 17:29:33.379114 env[1153]: time="2025-05-15T17:29:33.379046741Z" level=info msg="CreateContainer within sandbox \"c2295653c87a59326863c01a2e358b9a5936e46eee517135585e73cd10e02978\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"6550044178d82bef888e226eca8532382f000e0fefbd32a4f065d5c814c92df2\"" May 15 17:29:33.381032 env[1153]: time="2025-05-15T17:29:33.381006503Z" level=info msg="StartContainer for \"6550044178d82bef888e226eca8532382f000e0fefbd32a4f065d5c814c92df2\"" May 15 17:29:33.421973 systemd[1]: Started cri-containerd-6550044178d82bef888e226eca8532382f000e0fefbd32a4f065d5c814c92df2.scope. May 15 17:29:33.459000 audit[2021]: AVC avc: denied { perfmon } for pid=2021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:33.462079 kernel: kauditd_printk_skb: 34 callbacks suppressed May 15 17:29:33.462307 kernel: audit: type=1400 audit(1747330173.459:534): avc: denied { perfmon } for pid=2021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:33.459000 audit[2021]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fd6e86d6f88 items=0 ppid=1534 pid=2021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:33.473707 kernel: audit: type=1300 audit(1747330173.459:534): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fd6e86d6f88 items=0 ppid=1534 pid=2021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:33.473811 kernel: audit: type=1327 audit(1747330173.459:534): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635353030343431373864383262656638383865323236656361383533 May 15 17:29:33.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635353030343431373864383262656638383865323236656361383533 May 15 17:29:33.480012 kernel: audit: type=1400 audit(1747330173.459:535): avc: denied { bpf } for pid=2021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:33.459000 audit[2021]: AVC avc: denied { bpf } for pid=2021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:33.459000 audit[2021]: AVC avc: denied { bpf } for pid=2021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:33.489128 kernel: audit: type=1400 audit(1747330173.459:535): avc: denied { bpf } for pid=2021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:33.489187 kernel: audit: type=1400 audit(1747330173.459:535): avc: denied { bpf } for pid=2021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:33.459000 audit[2021]: AVC avc: denied { bpf } for pid=2021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:33.497374 kernel: audit: type=1400 audit(1747330173.459:535): avc: denied { perfmon } for pid=2021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:33.459000 audit[2021]: AVC avc: denied { perfmon } for pid=2021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:33.459000 audit[2021]: AVC avc: denied { perfmon } for pid=2021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:33.507352 kernel: audit: type=1400 audit(1747330173.459:535): avc: denied { perfmon } for pid=2021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:33.459000 audit[2021]: AVC avc: denied { perfmon } for pid=2021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:33.459000 audit[2021]: AVC avc: denied { perfmon } for pid=2021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:33.518728 kernel: audit: type=1400 audit(1747330173.459:535): avc: denied { perfmon } for pid=2021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:33.518846 kernel: audit: type=1400 audit(1747330173.459:535): avc: denied { perfmon } for pid=2021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:33.459000 audit[2021]: AVC avc: denied { perfmon } for pid=2021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:33.459000 audit[2021]: AVC avc: denied { bpf } for pid=2021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:33.459000 audit[2021]: AVC avc: denied { bpf } for pid=2021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:33.459000 audit: BPF prog-id=78 op=LOAD May 15 17:29:33.459000 audit[2021]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001fa708 items=0 ppid=1534 pid=2021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:33.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635353030343431373864383262656638383865323236656361383533 May 15 17:29:33.466000 audit[2021]: AVC avc: denied { bpf } for pid=2021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:33.466000 audit[2021]: AVC avc: denied { bpf } for pid=2021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:33.466000 audit[2021]: AVC avc: denied { perfmon } for pid=2021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:33.466000 audit[2021]: AVC avc: denied { perfmon } for pid=2021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:33.466000 audit[2021]: AVC avc: denied { perfmon } for pid=2021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:33.466000 audit[2021]: AVC avc: denied { perfmon } for pid=2021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:33.466000 audit[2021]: AVC avc: denied { perfmon } for pid=2021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:33.466000 audit[2021]: AVC avc: denied { bpf } for pid=2021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:33.466000 audit[2021]: AVC avc: denied { bpf } for pid=2021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:33.466000 audit: BPF prog-id=79 op=LOAD May 15 17:29:33.466000 audit[2021]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001fa758 items=0 ppid=1534 pid=2021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:33.466000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635353030343431373864383262656638383865323236656361383533 May 15 17:29:33.484000 audit: BPF prog-id=79 op=UNLOAD May 15 17:29:33.484000 audit: BPF prog-id=78 op=UNLOAD May 15 17:29:33.484000 audit[2021]: AVC avc: denied { bpf } for pid=2021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:33.484000 audit[2021]: AVC avc: denied { bpf } for pid=2021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:33.484000 audit[2021]: AVC avc: denied { bpf } for pid=2021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:33.484000 audit[2021]: AVC avc: denied { perfmon } for pid=2021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:33.484000 audit[2021]: AVC avc: denied { perfmon } for pid=2021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:33.484000 audit[2021]: AVC avc: denied { perfmon } for pid=2021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:33.484000 audit[2021]: AVC avc: denied { perfmon } for pid=2021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:33.484000 audit[2021]: AVC avc: denied { perfmon } for pid=2021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:33.484000 audit[2021]: AVC avc: denied { bpf } for pid=2021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:33.484000 audit[2021]: AVC avc: denied { bpf } for pid=2021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:33.484000 audit: BPF prog-id=80 op=LOAD May 15 17:29:33.484000 audit[2021]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003da098 items=0 ppid=1534 pid=2021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:33.484000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635353030343431373864383262656638383865323236656361383533 May 15 17:29:33.544013 env[1153]: time="2025-05-15T17:29:33.543951975Z" level=info msg="StartContainer for \"6550044178d82bef888e226eca8532382f000e0fefbd32a4f065d5c814c92df2\" returns successfully" May 15 17:29:33.634071 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 15 17:29:33.634241 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 15 17:29:33.688347 kubelet[1449]: E0515 17:29:33.688279 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:34.143699 kubelet[1449]: I0515 17:29:34.141471 1449 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-hhp82" podStartSLOduration=3.207473667 podStartE2EDuration="30.141214873s" podCreationTimestamp="2025-05-15 17:29:04 +0000 UTC" firstStartedPulling="2025-05-15 17:29:06.382015571 +0000 UTC m=+3.587170485" lastFinishedPulling="2025-05-15 17:29:33.315756777 +0000 UTC m=+30.520911691" observedRunningTime="2025-05-15 17:29:34.126186025 +0000 UTC m=+31.331340989" watchObservedRunningTime="2025-05-15 17:29:34.141214873 +0000 UTC m=+31.346369897" May 15 17:29:34.688922 kubelet[1449]: E0515 17:29:34.688858 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:35.165578 systemd[1]: run-containerd-runc-k8s.io-6550044178d82bef888e226eca8532382f000e0fefbd32a4f065d5c814c92df2-runc.FPTbJB.mount: Deactivated successfully. May 15 17:29:35.191000 audit[2160]: AVC avc: denied { write } for pid=2160 comm="tee" name="fd" dev="proc" ino=19330 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 17:29:35.191000 audit[2160]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff7555fa17 a2=241 a3=1b6 items=1 ppid=2115 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:35.191000 audit: CWD cwd="/etc/service/enabled/bird/log" May 15 17:29:35.191000 audit: PATH item=0 name="/dev/fd/63" inode=18429 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:29:35.191000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 17:29:35.204000 audit[2171]: AVC avc: denied { write } for pid=2171 comm="tee" name="fd" dev="proc" ino=19358 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 17:29:35.204000 audit[2171]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffce3fb1a18 a2=241 a3=1b6 items=1 ppid=2120 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:35.204000 audit: CWD cwd="/etc/service/enabled/cni/log" May 15 17:29:35.204000 audit: PATH item=0 name="/dev/fd/63" inode=19355 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:29:35.204000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 17:29:35.206000 audit[2175]: AVC avc: denied { write } for pid=2175 comm="tee" name="fd" dev="proc" ino=19362 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 17:29:35.206000 audit[2175]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc3a564a16 a2=241 a3=1b6 items=1 ppid=2117 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:35.206000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 15 17:29:35.206000 audit: PATH item=0 name="/dev/fd/63" inode=19465 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:29:35.206000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 17:29:35.212000 audit[2163]: AVC avc: denied { write } for pid=2163 comm="tee" name="fd" dev="proc" ino=19478 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 17:29:35.212000 audit[2163]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe5ec82a07 a2=241 a3=1b6 items=1 ppid=2122 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:35.212000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 15 17:29:35.212000 audit: PATH item=0 name="/dev/fd/63" inode=19458 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:29:35.212000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 17:29:35.216000 audit[2180]: AVC avc: denied { write } for pid=2180 comm="tee" name="fd" dev="proc" ino=19482 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 17:29:35.217000 audit[2182]: AVC avc: denied { write } for pid=2182 comm="tee" name="fd" dev="proc" ino=19485 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 17:29:35.216000 audit[2180]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffed67da16 a2=241 a3=1b6 items=1 ppid=2114 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:35.216000 audit: CWD cwd="/etc/service/enabled/confd/log" May 15 17:29:35.216000 audit: PATH item=0 name="/dev/fd/63" inode=19470 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:29:35.216000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 17:29:35.217000 audit[2182]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe6e352a16 a2=241 a3=1b6 items=1 ppid=2119 pid=2182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:35.217000 audit: CWD cwd="/etc/service/enabled/felix/log" May 15 17:29:35.217000 audit: PATH item=0 name="/dev/fd/63" inode=19473 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:29:35.217000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 17:29:35.239000 audit[2204]: AVC avc: denied { write } for pid=2204 comm="tee" name="fd" dev="proc" ino=19495 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 17:29:35.239000 audit[2204]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcd417fa06 a2=241 a3=1b6 items=1 ppid=2124 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:35.239000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 15 17:29:35.239000 audit: PATH item=0 name="/dev/fd/63" inode=19489 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:29:35.239000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 17:29:35.494000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.494000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.494000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.494000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.494000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.494000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.494000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.494000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.494000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.494000 audit: BPF prog-id=81 op=LOAD May 15 17:29:35.494000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe9c694f60 a2=98 a3=3 items=0 ppid=2132 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:35.494000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 17:29:35.494000 audit: BPF prog-id=81 op=UNLOAD May 15 17:29:35.494000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.494000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.494000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.494000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.494000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.494000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.494000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.494000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.494000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.494000 audit: BPF prog-id=82 op=LOAD May 15 17:29:35.494000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe9c694d40 a2=74 a3=540051 items=0 ppid=2132 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:35.494000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 17:29:35.494000 audit: BPF prog-id=82 op=UNLOAD May 15 17:29:35.494000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.494000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.494000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.494000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.494000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.494000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.494000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.494000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.494000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.494000 audit: BPF prog-id=83 op=LOAD May 15 17:29:35.494000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe9c694d70 a2=94 a3=2 items=0 ppid=2132 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:35.494000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 17:29:35.494000 audit: BPF prog-id=83 op=UNLOAD May 15 17:29:35.677000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.677000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.677000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.677000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.677000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.677000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.677000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.677000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.677000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.677000 audit: BPF prog-id=84 op=LOAD May 15 17:29:35.677000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe9c694c30 a2=40 a3=1 items=0 ppid=2132 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:35.677000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 17:29:35.677000 audit: BPF prog-id=84 op=UNLOAD May 15 17:29:35.677000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.677000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe9c694d00 a2=50 a3=7ffe9c694de0 items=0 ppid=2132 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:35.677000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 17:29:35.687000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.687000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe9c694c40 a2=28 a3=0 items=0 ppid=2132 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:35.687000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 17:29:35.687000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.687000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe9c694c70 a2=28 a3=0 items=0 ppid=2132 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:35.687000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 17:29:35.687000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.687000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe9c694b80 a2=28 a3=0 items=0 ppid=2132 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:35.687000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 17:29:35.687000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.687000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe9c694c90 a2=28 a3=0 items=0 ppid=2132 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:35.687000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 17:29:35.688000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.688000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe9c694c70 a2=28 a3=0 items=0 ppid=2132 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:35.688000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 17:29:35.688000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.688000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe9c694c60 a2=28 a3=0 items=0 ppid=2132 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:35.688000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 17:29:35.688000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.688000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe9c694c90 a2=28 a3=0 items=0 ppid=2132 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:35.688000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 17:29:35.688000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.690161 kubelet[1449]: E0515 17:29:35.690061 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:35.688000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe9c694c70 a2=28 a3=0 items=0 ppid=2132 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:35.688000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 17:29:35.689000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.689000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe9c694c90 a2=28 a3=0 items=0 ppid=2132 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:35.689000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 17:29:35.689000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.689000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe9c694c60 a2=28 a3=0 items=0 ppid=2132 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:35.689000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 17:29:35.689000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.689000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe9c694cd0 a2=28 a3=0 items=0 ppid=2132 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:35.689000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 17:29:35.690000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.690000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe9c694a80 a2=50 a3=1 items=0 ppid=2132 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:35.690000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 17:29:35.690000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.690000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.690000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.690000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.690000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.690000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.690000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.690000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.690000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.690000 audit: BPF prog-id=85 op=LOAD May 15 17:29:35.690000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe9c694a80 a2=94 a3=5 items=0 ppid=2132 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:35.690000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 17:29:35.690000 audit: BPF prog-id=85 op=UNLOAD May 15 17:29:35.690000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.690000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe9c694b30 a2=50 a3=1 items=0 ppid=2132 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:35.690000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 17:29:35.691000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.691000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe9c694c50 a2=4 a3=38 items=0 ppid=2132 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:35.691000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 17:29:35.691000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.691000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.691000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.691000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.691000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.691000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.691000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.691000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.691000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.691000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.691000 audit[2242]: AVC avc: denied { confidentiality } for pid=2242 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:29:35.691000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe9c694ca0 a2=94 a3=6 items=0 ppid=2132 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:35.691000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 17:29:35.692000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.692000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.692000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.692000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.692000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.692000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.692000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.692000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.692000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.692000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.692000 audit[2242]: AVC avc: denied { confidentiality } for pid=2242 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:29:35.692000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe9c694450 a2=94 a3=83 items=0 ppid=2132 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:35.692000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 17:29:35.693000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.693000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.693000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.693000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.693000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.693000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.693000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.693000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.693000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.693000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.693000 audit[2242]: AVC avc: denied { confidentiality } for pid=2242 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:29:35.693000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe9c694450 a2=94 a3=83 items=0 ppid=2132 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:35.693000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 17:29:35.704000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.704000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.704000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.704000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.704000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.704000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.704000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.704000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.704000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.704000 audit: BPF prog-id=86 op=LOAD May 15 17:29:35.704000 audit[2245]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe357f34c0 a2=98 a3=1999999999999999 items=0 ppid=2132 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:35.704000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 17:29:35.705000 audit: BPF prog-id=86 op=UNLOAD May 15 17:29:35.705000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.705000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.705000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.705000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.705000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.705000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.705000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.705000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.705000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.705000 audit: BPF prog-id=87 op=LOAD May 15 17:29:35.705000 audit[2245]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe357f33a0 a2=74 a3=ffff items=0 ppid=2132 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:35.705000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 17:29:35.705000 audit: BPF prog-id=87 op=UNLOAD May 15 17:29:35.705000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.705000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.705000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.705000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.705000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.705000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.705000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.705000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.705000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.705000 audit: BPF prog-id=88 op=LOAD May 15 17:29:35.705000 audit[2245]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe357f33e0 a2=40 a3=7ffe357f35c0 items=0 ppid=2132 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:35.705000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 17:29:35.705000 audit: BPF prog-id=88 op=UNLOAD May 15 17:29:35.818370 systemd-networkd[984]: vxlan.calico: Link UP May 15 17:29:35.818378 systemd-networkd[984]: vxlan.calico: Gained carrier May 15 17:29:35.871000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.871000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.871000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.871000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.871000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.871000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.871000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.871000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.871000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.871000 audit: BPF prog-id=89 op=LOAD May 15 17:29:35.871000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd5ce23d20 a2=98 a3=ffff items=0 ppid=2132 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:35.871000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 17:29:35.871000 audit: BPF prog-id=89 op=UNLOAD May 15 17:29:35.871000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.871000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.871000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.871000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.871000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.871000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.871000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.871000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.871000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.871000 audit: BPF prog-id=90 op=LOAD May 15 17:29:35.871000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd5ce23b30 a2=74 a3=540051 items=0 ppid=2132 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:35.871000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 17:29:35.871000 audit: BPF prog-id=90 op=UNLOAD May 15 17:29:35.871000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.871000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.871000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.871000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.871000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.871000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.871000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.871000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.871000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.871000 audit: BPF prog-id=91 op=LOAD May 15 17:29:35.871000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd5ce23b60 a2=94 a3=2 items=0 ppid=2132 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:35.871000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 17:29:35.871000 audit: BPF prog-id=91 op=UNLOAD May 15 17:29:35.871000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.871000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd5ce23a30 a2=28 a3=0 items=0 ppid=2132 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:35.871000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 17:29:35.871000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.871000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd5ce23a60 a2=28 a3=0 items=0 ppid=2132 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:35.871000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 17:29:35.871000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.871000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd5ce23970 a2=28 a3=0 items=0 ppid=2132 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:35.871000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 17:29:35.871000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.871000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd5ce23a80 a2=28 a3=0 items=0 ppid=2132 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:35.871000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 17:29:35.871000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.871000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd5ce23a60 a2=28 a3=0 items=0 ppid=2132 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:35.871000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 17:29:35.871000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.871000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd5ce23a50 a2=28 a3=0 items=0 ppid=2132 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:35.871000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 17:29:35.871000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.871000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd5ce23a80 a2=28 a3=0 items=0 ppid=2132 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:35.871000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 17:29:35.871000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.871000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd5ce23a60 a2=28 a3=0 items=0 ppid=2132 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:35.871000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 17:29:35.871000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.871000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd5ce23a80 a2=28 a3=0 items=0 ppid=2132 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:35.871000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 17:29:35.871000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.871000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd5ce23a50 a2=28 a3=0 items=0 ppid=2132 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:35.871000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 17:29:35.871000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.871000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd5ce23ac0 a2=28 a3=0 items=0 ppid=2132 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:35.871000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 17:29:35.871000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.871000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.871000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.871000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.871000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.871000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.871000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.871000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.871000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.871000 audit: BPF prog-id=92 op=LOAD May 15 17:29:35.871000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd5ce23930 a2=40 a3=0 items=0 ppid=2132 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:35.871000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 17:29:35.872000 audit: BPF prog-id=92 op=UNLOAD May 15 17:29:35.872000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.872000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffd5ce23920 a2=50 a3=2800 items=0 ppid=2132 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:35.872000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 17:29:35.872000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.872000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffd5ce23920 a2=50 a3=2800 items=0 ppid=2132 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:35.872000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 17:29:35.872000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.872000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.872000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.872000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.872000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.872000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.872000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.872000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.872000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.872000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.872000 audit: BPF prog-id=93 op=LOAD May 15 17:29:35.872000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd5ce23140 a2=94 a3=2 items=0 ppid=2132 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:35.872000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 17:29:35.872000 audit: BPF prog-id=93 op=UNLOAD May 15 17:29:35.872000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.872000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.872000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.872000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.872000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.872000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.872000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.872000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.872000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.872000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.872000 audit: BPF prog-id=94 op=LOAD May 15 17:29:35.872000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd5ce23240 a2=94 a3=30 items=0 ppid=2132 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:35.872000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 17:29:35.880000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.880000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.880000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.880000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.880000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.880000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.880000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.880000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.880000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.880000 audit: BPF prog-id=95 op=LOAD May 15 17:29:35.880000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd93ed48b0 a2=98 a3=0 items=0 ppid=2132 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:35.880000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 17:29:35.881000 audit: BPF prog-id=95 op=UNLOAD May 15 17:29:35.881000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.881000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.881000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.881000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.881000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.881000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.881000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.881000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.881000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.881000 audit: BPF prog-id=96 op=LOAD May 15 17:29:35.881000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd93ed4690 a2=74 a3=540051 items=0 ppid=2132 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:35.881000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 17:29:35.881000 audit: BPF prog-id=96 op=UNLOAD May 15 17:29:35.881000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.881000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.881000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.881000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.881000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.881000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.881000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.881000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.881000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:35.881000 audit: BPF prog-id=97 op=LOAD May 15 17:29:35.881000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd93ed46c0 a2=94 a3=2 items=0 ppid=2132 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:35.881000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 17:29:35.881000 audit: BPF prog-id=97 op=UNLOAD May 15 17:29:35.944358 env[1153]: time="2025-05-15T17:29:35.943654449Z" level=info msg="StopPodSandbox for \"04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7\"" May 15 17:29:36.003000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.003000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.003000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.003000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.003000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.003000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.003000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.003000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.003000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.003000 audit: BPF prog-id=98 op=LOAD May 15 17:29:36.003000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd93ed4580 a2=40 a3=1 items=0 ppid=2132 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:36.003000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 17:29:36.003000 audit: BPF prog-id=98 op=UNLOAD May 15 17:29:36.003000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.003000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd93ed4650 a2=50 a3=7ffd93ed4730 items=0 ppid=2132 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:36.003000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 17:29:36.013000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.013000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd93ed4590 a2=28 a3=0 items=0 ppid=2132 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:36.013000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 17:29:36.013000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.013000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd93ed45c0 a2=28 a3=0 items=0 ppid=2132 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:36.013000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 17:29:36.013000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.013000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd93ed44d0 a2=28 a3=0 items=0 ppid=2132 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:36.013000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 17:29:36.013000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.013000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd93ed45e0 a2=28 a3=0 items=0 ppid=2132 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:36.013000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 17:29:36.013000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.013000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd93ed45c0 a2=28 a3=0 items=0 ppid=2132 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:36.013000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 17:29:36.013000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.013000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd93ed45b0 a2=28 a3=0 items=0 ppid=2132 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:36.013000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 17:29:36.013000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.013000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd93ed45e0 a2=28 a3=0 items=0 ppid=2132 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:36.013000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 17:29:36.013000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.013000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd93ed45c0 a2=28 a3=0 items=0 ppid=2132 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:36.013000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 17:29:36.013000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.013000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd93ed45e0 a2=28 a3=0 items=0 ppid=2132 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:36.013000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 17:29:36.013000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.013000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd93ed45b0 a2=28 a3=0 items=0 ppid=2132 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:36.013000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 17:29:36.013000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.013000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd93ed4620 a2=28 a3=0 items=0 ppid=2132 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:36.013000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 17:29:36.014000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.014000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd93ed43d0 a2=50 a3=1 items=0 ppid=2132 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:36.014000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 17:29:36.014000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.014000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.014000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.014000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.014000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.014000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.014000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.014000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.014000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.014000 audit: BPF prog-id=99 op=LOAD May 15 17:29:36.014000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd93ed43d0 a2=94 a3=5 items=0 ppid=2132 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:36.014000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 17:29:36.014000 audit: BPF prog-id=99 op=UNLOAD May 15 17:29:36.014000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.014000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd93ed4480 a2=50 a3=1 items=0 ppid=2132 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:36.014000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 17:29:36.014000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.014000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd93ed45a0 a2=4 a3=38 items=0 ppid=2132 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:36.014000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 17:29:36.014000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.014000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.014000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.014000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.014000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.014000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.014000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.014000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.014000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.014000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.014000 audit[2276]: AVC avc: denied { confidentiality } for pid=2276 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:29:36.014000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd93ed45f0 a2=94 a3=6 items=0 ppid=2132 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:36.014000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 17:29:36.014000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.014000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.014000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.014000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.014000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.014000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.014000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.014000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.014000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.014000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.014000 audit[2276]: AVC avc: denied { confidentiality } for pid=2276 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:29:36.014000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd93ed3da0 a2=94 a3=83 items=0 ppid=2132 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:36.014000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 17:29:36.014000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.014000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.014000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.014000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.014000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.014000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.014000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.014000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.014000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.014000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.014000 audit[2276]: AVC avc: denied { confidentiality } for pid=2276 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:29:36.014000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd93ed3da0 a2=94 a3=83 items=0 ppid=2132 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:36.014000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 17:29:36.015000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.015000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd93ed57e0 a2=10 a3=f0f1 items=0 ppid=2132 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:36.015000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 17:29:36.015000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.015000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd93ed5680 a2=10 a3=3 items=0 ppid=2132 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:36.015000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 17:29:36.015000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.015000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd93ed5620 a2=10 a3=3 items=0 ppid=2132 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:36.015000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 17:29:36.015000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.015000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd93ed5620 a2=10 a3=7 items=0 ppid=2132 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:36.015000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 17:29:36.021000 audit: BPF prog-id=94 op=UNLOAD May 15 17:29:36.098475 env[1153]: 2025-05-15 17:29:36.032 [INFO][2295] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7" May 15 17:29:36.098475 env[1153]: 2025-05-15 17:29:36.032 [INFO][2295] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7" iface="eth0" netns="/var/run/netns/cni-ab8dc6f5-6a15-2abd-0a9e-ea64a3228949" May 15 17:29:36.098475 env[1153]: 2025-05-15 17:29:36.032 [INFO][2295] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7" iface="eth0" netns="/var/run/netns/cni-ab8dc6f5-6a15-2abd-0a9e-ea64a3228949" May 15 17:29:36.098475 env[1153]: 2025-05-15 17:29:36.032 [INFO][2295] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7" iface="eth0" netns="/var/run/netns/cni-ab8dc6f5-6a15-2abd-0a9e-ea64a3228949" May 15 17:29:36.098475 env[1153]: 2025-05-15 17:29:36.032 [INFO][2295] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7" May 15 17:29:36.098475 env[1153]: 2025-05-15 17:29:36.032 [INFO][2295] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7" May 15 17:29:36.098475 env[1153]: 2025-05-15 17:29:36.076 [INFO][2307] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7" HandleID="k8s-pod-network.04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7" Workload="172.24.4.218-k8s-csi--node--driver--7mk6b-eth0" May 15 17:29:36.098475 env[1153]: 2025-05-15 17:29:36.076 [INFO][2307] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 17:29:36.098475 env[1153]: 2025-05-15 17:29:36.076 [INFO][2307] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 17:29:36.098475 env[1153]: 2025-05-15 17:29:36.091 [WARNING][2307] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7" HandleID="k8s-pod-network.04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7" Workload="172.24.4.218-k8s-csi--node--driver--7mk6b-eth0" May 15 17:29:36.098475 env[1153]: 2025-05-15 17:29:36.091 [INFO][2307] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7" HandleID="k8s-pod-network.04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7" Workload="172.24.4.218-k8s-csi--node--driver--7mk6b-eth0" May 15 17:29:36.098475 env[1153]: 2025-05-15 17:29:36.093 [INFO][2307] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 17:29:36.098475 env[1153]: 2025-05-15 17:29:36.097 [INFO][2295] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7" May 15 17:29:36.102048 systemd[1]: run-netns-cni\x2dab8dc6f5\x2d6a15\x2d2abd\x2d0a9e\x2dea64a3228949.mount: Deactivated successfully. May 15 17:29:36.104288 env[1153]: time="2025-05-15T17:29:36.103440281Z" level=info msg="TearDown network for sandbox \"04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7\" successfully" May 15 17:29:36.104288 env[1153]: time="2025-05-15T17:29:36.103495204Z" level=info msg="StopPodSandbox for \"04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7\" returns successfully" May 15 17:29:36.105068 env[1153]: time="2025-05-15T17:29:36.105039782Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7mk6b,Uid:a2c6d92b-36a3-4601-a9d0-56c12423f442,Namespace:calico-system,Attempt:1,}" May 15 17:29:36.119000 audit[2330]: NETFILTER_CFG table=mangle:65 family=2 entries=16 op=nft_register_chain pid=2330 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 17:29:36.119000 audit[2330]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffef0916890 a2=0 a3=7ffef091687c items=0 ppid=2132 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:36.119000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 17:29:36.138000 audit[2328]: NETFILTER_CFG table=raw:66 family=2 entries=21 op=nft_register_chain pid=2328 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 17:29:36.138000 audit[2328]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffc503d5ef0 a2=0 a3=7ffc503d5edc items=0 ppid=2132 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:36.138000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 17:29:36.146000 audit[2329]: NETFILTER_CFG table=nat:67 family=2 entries=15 op=nft_register_chain pid=2329 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 17:29:36.146000 audit[2329]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffeb8a34a30 a2=0 a3=7ffeb8a34a1c items=0 ppid=2132 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:36.146000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 17:29:36.156000 audit[2334]: NETFILTER_CFG table=filter:68 family=2 entries=39 op=nft_register_chain pid=2334 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 17:29:36.156000 audit[2334]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffe27e62790 a2=0 a3=7ffe27e6277c items=0 ppid=2132 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:36.156000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 17:29:36.298318 systemd-networkd[984]: caliaa280464d33: Link UP May 15 17:29:36.301510 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliaa280464d33: link becomes ready May 15 17:29:36.300802 systemd-networkd[984]: caliaa280464d33: Gained carrier May 15 17:29:36.317857 env[1153]: 2025-05-15 17:29:36.201 [INFO][2337] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.218-k8s-csi--node--driver--7mk6b-eth0 csi-node-driver- calico-system a2c6d92b-36a3-4601-a9d0-56c12423f442 1357 0 2025-05-15 17:29:03 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:5bcd8f69 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 172.24.4.218 csi-node-driver-7mk6b eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] caliaa280464d33 [] []}} ContainerID="d351844f490206c95d79ac67268565cca021226fd34962267b52faf877a63d7b" Namespace="calico-system" Pod="csi-node-driver-7mk6b" WorkloadEndpoint="172.24.4.218-k8s-csi--node--driver--7mk6b-" May 15 17:29:36.317857 env[1153]: 2025-05-15 17:29:36.201 [INFO][2337] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="d351844f490206c95d79ac67268565cca021226fd34962267b52faf877a63d7b" Namespace="calico-system" Pod="csi-node-driver-7mk6b" WorkloadEndpoint="172.24.4.218-k8s-csi--node--driver--7mk6b-eth0" May 15 17:29:36.317857 env[1153]: 2025-05-15 17:29:36.241 [INFO][2354] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d351844f490206c95d79ac67268565cca021226fd34962267b52faf877a63d7b" HandleID="k8s-pod-network.d351844f490206c95d79ac67268565cca021226fd34962267b52faf877a63d7b" Workload="172.24.4.218-k8s-csi--node--driver--7mk6b-eth0" May 15 17:29:36.317857 env[1153]: 2025-05-15 17:29:36.256 [INFO][2354] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d351844f490206c95d79ac67268565cca021226fd34962267b52faf877a63d7b" HandleID="k8s-pod-network.d351844f490206c95d79ac67268565cca021226fd34962267b52faf877a63d7b" Workload="172.24.4.218-k8s-csi--node--driver--7mk6b-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031b3a0), Attrs:map[string]string{"namespace":"calico-system", "node":"172.24.4.218", "pod":"csi-node-driver-7mk6b", "timestamp":"2025-05-15 17:29:36.241857902 +0000 UTC"}, Hostname:"172.24.4.218", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 17:29:36.317857 env[1153]: 2025-05-15 17:29:36.256 [INFO][2354] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 17:29:36.317857 env[1153]: 2025-05-15 17:29:36.256 [INFO][2354] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 17:29:36.317857 env[1153]: 2025-05-15 17:29:36.256 [INFO][2354] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.218' May 15 17:29:36.317857 env[1153]: 2025-05-15 17:29:36.259 [INFO][2354] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d351844f490206c95d79ac67268565cca021226fd34962267b52faf877a63d7b" host="172.24.4.218" May 15 17:29:36.317857 env[1153]: 2025-05-15 17:29:36.262 [INFO][2354] ipam/ipam.go 372: Looking up existing affinities for host host="172.24.4.218" May 15 17:29:36.317857 env[1153]: 2025-05-15 17:29:36.267 [INFO][2354] ipam/ipam.go 489: Trying affinity for 192.168.118.192/26 host="172.24.4.218" May 15 17:29:36.317857 env[1153]: 2025-05-15 17:29:36.269 [INFO][2354] ipam/ipam.go 155: Attempting to load block cidr=192.168.118.192/26 host="172.24.4.218" May 15 17:29:36.317857 env[1153]: 2025-05-15 17:29:36.271 [INFO][2354] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.118.192/26 host="172.24.4.218" May 15 17:29:36.317857 env[1153]: 2025-05-15 17:29:36.271 [INFO][2354] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.118.192/26 handle="k8s-pod-network.d351844f490206c95d79ac67268565cca021226fd34962267b52faf877a63d7b" host="172.24.4.218" May 15 17:29:36.317857 env[1153]: 2025-05-15 17:29:36.273 [INFO][2354] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.d351844f490206c95d79ac67268565cca021226fd34962267b52faf877a63d7b May 15 17:29:36.317857 env[1153]: 2025-05-15 17:29:36.282 [INFO][2354] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.118.192/26 handle="k8s-pod-network.d351844f490206c95d79ac67268565cca021226fd34962267b52faf877a63d7b" host="172.24.4.218" May 15 17:29:36.317857 env[1153]: 2025-05-15 17:29:36.290 [INFO][2354] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.118.193/26] block=192.168.118.192/26 handle="k8s-pod-network.d351844f490206c95d79ac67268565cca021226fd34962267b52faf877a63d7b" host="172.24.4.218" May 15 17:29:36.317857 env[1153]: 2025-05-15 17:29:36.290 [INFO][2354] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.118.193/26] handle="k8s-pod-network.d351844f490206c95d79ac67268565cca021226fd34962267b52faf877a63d7b" host="172.24.4.218" May 15 17:29:36.317857 env[1153]: 2025-05-15 17:29:36.290 [INFO][2354] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 17:29:36.317857 env[1153]: 2025-05-15 17:29:36.290 [INFO][2354] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.118.193/26] IPv6=[] ContainerID="d351844f490206c95d79ac67268565cca021226fd34962267b52faf877a63d7b" HandleID="k8s-pod-network.d351844f490206c95d79ac67268565cca021226fd34962267b52faf877a63d7b" Workload="172.24.4.218-k8s-csi--node--driver--7mk6b-eth0" May 15 17:29:36.318690 env[1153]: 2025-05-15 17:29:36.292 [INFO][2337] cni-plugin/k8s.go 386: Populated endpoint ContainerID="d351844f490206c95d79ac67268565cca021226fd34962267b52faf877a63d7b" Namespace="calico-system" Pod="csi-node-driver-7mk6b" WorkloadEndpoint="172.24.4.218-k8s-csi--node--driver--7mk6b-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.218-k8s-csi--node--driver--7mk6b-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a2c6d92b-36a3-4601-a9d0-56c12423f442", ResourceVersion:"1357", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 17, 29, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.218", ContainerID:"", Pod:"csi-node-driver-7mk6b", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.118.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"caliaa280464d33", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 17:29:36.318690 env[1153]: 2025-05-15 17:29:36.292 [INFO][2337] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.118.193/32] ContainerID="d351844f490206c95d79ac67268565cca021226fd34962267b52faf877a63d7b" Namespace="calico-system" Pod="csi-node-driver-7mk6b" WorkloadEndpoint="172.24.4.218-k8s-csi--node--driver--7mk6b-eth0" May 15 17:29:36.318690 env[1153]: 2025-05-15 17:29:36.292 [INFO][2337] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to caliaa280464d33 ContainerID="d351844f490206c95d79ac67268565cca021226fd34962267b52faf877a63d7b" Namespace="calico-system" Pod="csi-node-driver-7mk6b" WorkloadEndpoint="172.24.4.218-k8s-csi--node--driver--7mk6b-eth0" May 15 17:29:36.318690 env[1153]: 2025-05-15 17:29:36.300 [INFO][2337] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d351844f490206c95d79ac67268565cca021226fd34962267b52faf877a63d7b" Namespace="calico-system" Pod="csi-node-driver-7mk6b" WorkloadEndpoint="172.24.4.218-k8s-csi--node--driver--7mk6b-eth0" May 15 17:29:36.318690 env[1153]: 2025-05-15 17:29:36.302 [INFO][2337] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="d351844f490206c95d79ac67268565cca021226fd34962267b52faf877a63d7b" Namespace="calico-system" Pod="csi-node-driver-7mk6b" WorkloadEndpoint="172.24.4.218-k8s-csi--node--driver--7mk6b-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.218-k8s-csi--node--driver--7mk6b-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a2c6d92b-36a3-4601-a9d0-56c12423f442", ResourceVersion:"1357", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 17, 29, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.218", ContainerID:"d351844f490206c95d79ac67268565cca021226fd34962267b52faf877a63d7b", Pod:"csi-node-driver-7mk6b", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.118.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"caliaa280464d33", MAC:"da:33:29:98:fa:e4", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 17:29:36.318690 env[1153]: 2025-05-15 17:29:36.316 [INFO][2337] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="d351844f490206c95d79ac67268565cca021226fd34962267b52faf877a63d7b" Namespace="calico-system" Pod="csi-node-driver-7mk6b" WorkloadEndpoint="172.24.4.218-k8s-csi--node--driver--7mk6b-eth0" May 15 17:29:36.330000 audit[2373]: NETFILTER_CFG table=filter:69 family=2 entries=34 op=nft_register_chain pid=2373 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 17:29:36.330000 audit[2373]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffca6d41550 a2=0 a3=7ffca6d4153c items=0 ppid=2132 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:36.330000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 17:29:36.338657 env[1153]: time="2025-05-15T17:29:36.338324279Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 17:29:36.338657 env[1153]: time="2025-05-15T17:29:36.338393589Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 17:29:36.338657 env[1153]: time="2025-05-15T17:29:36.338406784Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 17:29:36.338855 env[1153]: time="2025-05-15T17:29:36.338739840Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d351844f490206c95d79ac67268565cca021226fd34962267b52faf877a63d7b pid=2383 runtime=io.containerd.runc.v2 May 15 17:29:36.358623 systemd[1]: Started cri-containerd-d351844f490206c95d79ac67268565cca021226fd34962267b52faf877a63d7b.scope. May 15 17:29:36.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.373000 audit: BPF prog-id=100 op=LOAD May 15 17:29:36.374000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.374000 audit[2392]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2383 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:36.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433353138343466343930323036633935643739616336373236383536 May 15 17:29:36.374000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.374000 audit[2392]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2383 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:36.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433353138343466343930323036633935643739616336373236383536 May 15 17:29:36.374000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.374000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.374000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.374000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.374000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.374000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.374000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.374000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.374000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.374000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.374000 audit: BPF prog-id=101 op=LOAD May 15 17:29:36.374000 audit[2392]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00031d380 items=0 ppid=2383 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:36.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433353138343466343930323036633935643739616336373236383536 May 15 17:29:36.375000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.375000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.375000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.375000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.375000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.375000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.375000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.375000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.375000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.375000 audit: BPF prog-id=102 op=LOAD May 15 17:29:36.375000 audit[2392]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00031d3c8 items=0 ppid=2383 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:36.375000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433353138343466343930323036633935643739616336373236383536 May 15 17:29:36.376000 audit: BPF prog-id=102 op=UNLOAD May 15 17:29:36.376000 audit: BPF prog-id=101 op=UNLOAD May 15 17:29:36.376000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.376000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.376000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.376000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.376000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.376000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.376000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.376000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.376000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.376000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:36.376000 audit: BPF prog-id=103 op=LOAD May 15 17:29:36.376000 audit[2392]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00031d7d8 items=0 ppid=2383 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:36.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433353138343466343930323036633935643739616336373236383536 May 15 17:29:36.393282 env[1153]: time="2025-05-15T17:29:36.393231808Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7mk6b,Uid:a2c6d92b-36a3-4601-a9d0-56c12423f442,Namespace:calico-system,Attempt:1,} returns sandbox id \"d351844f490206c95d79ac67268565cca021226fd34962267b52faf877a63d7b\"" May 15 17:29:36.396899 env[1153]: time="2025-05-15T17:29:36.396840410Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 15 17:29:36.691641 kubelet[1449]: E0515 17:29:36.691306 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:37.104042 systemd[1]: run-containerd-runc-k8s.io-d351844f490206c95d79ac67268565cca021226fd34962267b52faf877a63d7b-runc.LNXt8j.mount: Deactivated successfully. May 15 17:29:37.388079 systemd-networkd[984]: caliaa280464d33: Gained IPv6LL May 15 17:29:37.515463 systemd-networkd[984]: vxlan.calico: Gained IPv6LL May 15 17:29:37.692362 kubelet[1449]: E0515 17:29:37.692192 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:38.693855 kubelet[1449]: E0515 17:29:38.693736 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:38.943177 env[1153]: time="2025-05-15T17:29:38.943017298Z" level=info msg="StopPodSandbox for \"77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54\"" May 15 17:29:39.290895 env[1153]: 2025-05-15 17:29:39.202 [INFO][2433] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54" May 15 17:29:39.290895 env[1153]: 2025-05-15 17:29:39.203 [INFO][2433] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54" iface="eth0" netns="/var/run/netns/cni-8fd30e7f-be0b-583c-6607-b0e371f02e8a" May 15 17:29:39.290895 env[1153]: 2025-05-15 17:29:39.204 [INFO][2433] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54" iface="eth0" netns="/var/run/netns/cni-8fd30e7f-be0b-583c-6607-b0e371f02e8a" May 15 17:29:39.290895 env[1153]: 2025-05-15 17:29:39.205 [INFO][2433] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54" iface="eth0" netns="/var/run/netns/cni-8fd30e7f-be0b-583c-6607-b0e371f02e8a" May 15 17:29:39.290895 env[1153]: 2025-05-15 17:29:39.205 [INFO][2433] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54" May 15 17:29:39.290895 env[1153]: 2025-05-15 17:29:39.205 [INFO][2433] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54" May 15 17:29:39.290895 env[1153]: 2025-05-15 17:29:39.264 [INFO][2441] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54" HandleID="k8s-pod-network.77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54" Workload="172.24.4.218-k8s-nginx--deployment--8587fbcb89--97phk-eth0" May 15 17:29:39.290895 env[1153]: 2025-05-15 17:29:39.265 [INFO][2441] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 17:29:39.290895 env[1153]: 2025-05-15 17:29:39.265 [INFO][2441] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 17:29:39.290895 env[1153]: 2025-05-15 17:29:39.282 [WARNING][2441] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54" HandleID="k8s-pod-network.77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54" Workload="172.24.4.218-k8s-nginx--deployment--8587fbcb89--97phk-eth0" May 15 17:29:39.290895 env[1153]: 2025-05-15 17:29:39.282 [INFO][2441] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54" HandleID="k8s-pod-network.77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54" Workload="172.24.4.218-k8s-nginx--deployment--8587fbcb89--97phk-eth0" May 15 17:29:39.290895 env[1153]: 2025-05-15 17:29:39.286 [INFO][2441] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 17:29:39.290895 env[1153]: 2025-05-15 17:29:39.288 [INFO][2433] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54" May 15 17:29:39.295279 systemd[1]: run-netns-cni\x2d8fd30e7f\x2dbe0b\x2d583c\x2d6607\x2db0e371f02e8a.mount: Deactivated successfully. May 15 17:29:39.297020 env[1153]: time="2025-05-15T17:29:39.296940056Z" level=info msg="TearDown network for sandbox \"77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54\" successfully" May 15 17:29:39.297338 env[1153]: time="2025-05-15T17:29:39.297258535Z" level=info msg="StopPodSandbox for \"77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54\" returns successfully" May 15 17:29:39.299844 env[1153]: time="2025-05-15T17:29:39.299774447Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-97phk,Uid:70454114-2fbd-4caf-8b7d-ec037621b9c6,Namespace:default,Attempt:1,}" May 15 17:29:39.596052 systemd-networkd[984]: cali4703b794c4d: Link UP May 15 17:29:39.602304 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 17:29:39.602511 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4703b794c4d: link becomes ready May 15 17:29:39.610209 systemd-networkd[984]: cali4703b794c4d: Gained carrier May 15 17:29:39.634269 env[1153]: 2025-05-15 17:29:39.420 [INFO][2447] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.218-k8s-nginx--deployment--8587fbcb89--97phk-eth0 nginx-deployment-8587fbcb89- default 70454114-2fbd-4caf-8b7d-ec037621b9c6 1367 0 2025-05-15 17:29:23 +0000 UTC map[app:nginx pod-template-hash:8587fbcb89 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.24.4.218 nginx-deployment-8587fbcb89-97phk eth0 default [] [] [kns.default ksa.default.default] cali4703b794c4d [] []}} ContainerID="2e574860da4ddc76aa727cd658381f2b728c3ae01634e82b7bf95f68768a2dc7" Namespace="default" Pod="nginx-deployment-8587fbcb89-97phk" WorkloadEndpoint="172.24.4.218-k8s-nginx--deployment--8587fbcb89--97phk-" May 15 17:29:39.634269 env[1153]: 2025-05-15 17:29:39.420 [INFO][2447] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="2e574860da4ddc76aa727cd658381f2b728c3ae01634e82b7bf95f68768a2dc7" Namespace="default" Pod="nginx-deployment-8587fbcb89-97phk" WorkloadEndpoint="172.24.4.218-k8s-nginx--deployment--8587fbcb89--97phk-eth0" May 15 17:29:39.634269 env[1153]: 2025-05-15 17:29:39.472 [INFO][2460] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2e574860da4ddc76aa727cd658381f2b728c3ae01634e82b7bf95f68768a2dc7" HandleID="k8s-pod-network.2e574860da4ddc76aa727cd658381f2b728c3ae01634e82b7bf95f68768a2dc7" Workload="172.24.4.218-k8s-nginx--deployment--8587fbcb89--97phk-eth0" May 15 17:29:39.634269 env[1153]: 2025-05-15 17:29:39.513 [INFO][2460] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="2e574860da4ddc76aa727cd658381f2b728c3ae01634e82b7bf95f68768a2dc7" HandleID="k8s-pod-network.2e574860da4ddc76aa727cd658381f2b728c3ae01634e82b7bf95f68768a2dc7" Workload="172.24.4.218-k8s-nginx--deployment--8587fbcb89--97phk-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00030ccd0), Attrs:map[string]string{"namespace":"default", "node":"172.24.4.218", "pod":"nginx-deployment-8587fbcb89-97phk", "timestamp":"2025-05-15 17:29:39.472674747 +0000 UTC"}, Hostname:"172.24.4.218", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 17:29:39.634269 env[1153]: 2025-05-15 17:29:39.513 [INFO][2460] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 17:29:39.634269 env[1153]: 2025-05-15 17:29:39.513 [INFO][2460] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 17:29:39.634269 env[1153]: 2025-05-15 17:29:39.513 [INFO][2460] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.218' May 15 17:29:39.634269 env[1153]: 2025-05-15 17:29:39.518 [INFO][2460] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2e574860da4ddc76aa727cd658381f2b728c3ae01634e82b7bf95f68768a2dc7" host="172.24.4.218" May 15 17:29:39.634269 env[1153]: 2025-05-15 17:29:39.528 [INFO][2460] ipam/ipam.go 372: Looking up existing affinities for host host="172.24.4.218" May 15 17:29:39.634269 env[1153]: 2025-05-15 17:29:39.545 [INFO][2460] ipam/ipam.go 489: Trying affinity for 192.168.118.192/26 host="172.24.4.218" May 15 17:29:39.634269 env[1153]: 2025-05-15 17:29:39.550 [INFO][2460] ipam/ipam.go 155: Attempting to load block cidr=192.168.118.192/26 host="172.24.4.218" May 15 17:29:39.634269 env[1153]: 2025-05-15 17:29:39.555 [INFO][2460] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.118.192/26 host="172.24.4.218" May 15 17:29:39.634269 env[1153]: 2025-05-15 17:29:39.555 [INFO][2460] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.118.192/26 handle="k8s-pod-network.2e574860da4ddc76aa727cd658381f2b728c3ae01634e82b7bf95f68768a2dc7" host="172.24.4.218" May 15 17:29:39.634269 env[1153]: 2025-05-15 17:29:39.558 [INFO][2460] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.2e574860da4ddc76aa727cd658381f2b728c3ae01634e82b7bf95f68768a2dc7 May 15 17:29:39.634269 env[1153]: 2025-05-15 17:29:39.565 [INFO][2460] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.118.192/26 handle="k8s-pod-network.2e574860da4ddc76aa727cd658381f2b728c3ae01634e82b7bf95f68768a2dc7" host="172.24.4.218" May 15 17:29:39.634269 env[1153]: 2025-05-15 17:29:39.584 [INFO][2460] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.118.194/26] block=192.168.118.192/26 handle="k8s-pod-network.2e574860da4ddc76aa727cd658381f2b728c3ae01634e82b7bf95f68768a2dc7" host="172.24.4.218" May 15 17:29:39.634269 env[1153]: 2025-05-15 17:29:39.584 [INFO][2460] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.118.194/26] handle="k8s-pod-network.2e574860da4ddc76aa727cd658381f2b728c3ae01634e82b7bf95f68768a2dc7" host="172.24.4.218" May 15 17:29:39.634269 env[1153]: 2025-05-15 17:29:39.584 [INFO][2460] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 17:29:39.634269 env[1153]: 2025-05-15 17:29:39.584 [INFO][2460] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.118.194/26] IPv6=[] ContainerID="2e574860da4ddc76aa727cd658381f2b728c3ae01634e82b7bf95f68768a2dc7" HandleID="k8s-pod-network.2e574860da4ddc76aa727cd658381f2b728c3ae01634e82b7bf95f68768a2dc7" Workload="172.24.4.218-k8s-nginx--deployment--8587fbcb89--97phk-eth0" May 15 17:29:39.636038 env[1153]: 2025-05-15 17:29:39.586 [INFO][2447] cni-plugin/k8s.go 386: Populated endpoint ContainerID="2e574860da4ddc76aa727cd658381f2b728c3ae01634e82b7bf95f68768a2dc7" Namespace="default" Pod="nginx-deployment-8587fbcb89-97phk" WorkloadEndpoint="172.24.4.218-k8s-nginx--deployment--8587fbcb89--97phk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.218-k8s-nginx--deployment--8587fbcb89--97phk-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"70454114-2fbd-4caf-8b7d-ec037621b9c6", ResourceVersion:"1367", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 17, 29, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.218", ContainerID:"", Pod:"nginx-deployment-8587fbcb89-97phk", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.118.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali4703b794c4d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 17:29:39.636038 env[1153]: 2025-05-15 17:29:39.586 [INFO][2447] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.118.194/32] ContainerID="2e574860da4ddc76aa727cd658381f2b728c3ae01634e82b7bf95f68768a2dc7" Namespace="default" Pod="nginx-deployment-8587fbcb89-97phk" WorkloadEndpoint="172.24.4.218-k8s-nginx--deployment--8587fbcb89--97phk-eth0" May 15 17:29:39.636038 env[1153]: 2025-05-15 17:29:39.587 [INFO][2447] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali4703b794c4d ContainerID="2e574860da4ddc76aa727cd658381f2b728c3ae01634e82b7bf95f68768a2dc7" Namespace="default" Pod="nginx-deployment-8587fbcb89-97phk" WorkloadEndpoint="172.24.4.218-k8s-nginx--deployment--8587fbcb89--97phk-eth0" May 15 17:29:39.636038 env[1153]: 2025-05-15 17:29:39.597 [INFO][2447] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="2e574860da4ddc76aa727cd658381f2b728c3ae01634e82b7bf95f68768a2dc7" Namespace="default" Pod="nginx-deployment-8587fbcb89-97phk" WorkloadEndpoint="172.24.4.218-k8s-nginx--deployment--8587fbcb89--97phk-eth0" May 15 17:29:39.636038 env[1153]: 2025-05-15 17:29:39.611 [INFO][2447] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="2e574860da4ddc76aa727cd658381f2b728c3ae01634e82b7bf95f68768a2dc7" Namespace="default" Pod="nginx-deployment-8587fbcb89-97phk" WorkloadEndpoint="172.24.4.218-k8s-nginx--deployment--8587fbcb89--97phk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.218-k8s-nginx--deployment--8587fbcb89--97phk-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"70454114-2fbd-4caf-8b7d-ec037621b9c6", ResourceVersion:"1367", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 17, 29, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.218", ContainerID:"2e574860da4ddc76aa727cd658381f2b728c3ae01634e82b7bf95f68768a2dc7", Pod:"nginx-deployment-8587fbcb89-97phk", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.118.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali4703b794c4d", MAC:"6e:e9:40:63:9b:7e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 17:29:39.636038 env[1153]: 2025-05-15 17:29:39.629 [INFO][2447] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="2e574860da4ddc76aa727cd658381f2b728c3ae01634e82b7bf95f68768a2dc7" Namespace="default" Pod="nginx-deployment-8587fbcb89-97phk" WorkloadEndpoint="172.24.4.218-k8s-nginx--deployment--8587fbcb89--97phk-eth0" May 15 17:29:39.666980 env[1153]: time="2025-05-15T17:29:39.666863479Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 17:29:39.666980 env[1153]: time="2025-05-15T17:29:39.666955703Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 17:29:39.666980 env[1153]: time="2025-05-15T17:29:39.666987242Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 17:29:39.667450 env[1153]: time="2025-05-15T17:29:39.667164736Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2e574860da4ddc76aa727cd658381f2b728c3ae01634e82b7bf95f68768a2dc7 pid=2492 runtime=io.containerd.runc.v2 May 15 17:29:39.681497 kernel: kauditd_printk_skb: 608 callbacks suppressed May 15 17:29:39.681633 kernel: audit: type=1325 audit(1747330179.675:661): table=filter:70 family=2 entries=38 op=nft_register_chain pid=2494 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 17:29:39.675000 audit[2494]: NETFILTER_CFG table=filter:70 family=2 entries=38 op=nft_register_chain pid=2494 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 17:29:39.688769 kernel: audit: type=1300 audit(1747330179.675:661): arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7ffc7103a100 a2=0 a3=7ffc7103a0ec items=0 ppid=2132 pid=2494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:39.693222 kernel: audit: type=1327 audit(1747330179.675:661): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 17:29:39.675000 audit[2494]: SYSCALL arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7ffc7103a100 a2=0 a3=7ffc7103a0ec items=0 ppid=2132 pid=2494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:39.675000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 17:29:39.694643 kubelet[1449]: E0515 17:29:39.694217 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:39.702062 systemd[1]: Started cri-containerd-2e574860da4ddc76aa727cd658381f2b728c3ae01634e82b7bf95f68768a2dc7.scope. May 15 17:29:39.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:39.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:39.733042 kernel: audit: type=1400 audit(1747330179.720:662): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:39.733127 kernel: audit: type=1400 audit(1747330179.720:663): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:39.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:39.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:39.744325 kernel: audit: type=1400 audit(1747330179.720:664): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:39.744391 kernel: audit: type=1400 audit(1747330179.720:665): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:39.744541 kernel: audit: type=1400 audit(1747330179.720:666): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:39.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:39.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:39.754480 kernel: audit: type=1400 audit(1747330179.720:667): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:39.754538 kernel: audit: type=1400 audit(1747330179.720:668): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:39.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:39.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:39.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:39.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:39.720000 audit: BPF prog-id=104 op=LOAD May 15 17:29:39.725000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:39.725000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2492 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:39.725000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265353734383630646134646463373661613732376364363538333831 May 15 17:29:39.725000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:39.725000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2492 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:39.725000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265353734383630646134646463373661613732376364363538333831 May 15 17:29:39.725000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:39.725000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:39.725000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:39.725000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:39.725000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:39.725000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:39.725000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:39.725000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:39.725000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:39.725000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:39.725000 audit: BPF prog-id=105 op=LOAD May 15 17:29:39.725000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0000245f0 items=0 ppid=2492 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:39.725000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265353734383630646134646463373661613732376364363538333831 May 15 17:29:39.732000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:39.732000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:39.732000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:39.732000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:39.732000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:39.732000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:39.732000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:39.732000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:39.732000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:39.732000 audit: BPF prog-id=106 op=LOAD May 15 17:29:39.732000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000024638 items=0 ppid=2492 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:39.732000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265353734383630646134646463373661613732376364363538333831 May 15 17:29:39.737000 audit: BPF prog-id=106 op=UNLOAD May 15 17:29:39.737000 audit: BPF prog-id=105 op=UNLOAD May 15 17:29:39.737000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:39.737000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:39.737000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:39.737000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:39.737000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:39.737000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:39.737000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:39.737000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:39.737000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:39.737000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:39.737000 audit: BPF prog-id=107 op=LOAD May 15 17:29:39.737000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000024a48 items=0 ppid=2492 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:39.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265353734383630646134646463373661613732376364363538333831 May 15 17:29:39.788912 env[1153]: time="2025-05-15T17:29:39.788861566Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-97phk,Uid:70454114-2fbd-4caf-8b7d-ec037621b9c6,Namespace:default,Attempt:1,} returns sandbox id \"2e574860da4ddc76aa727cd658381f2b728c3ae01634e82b7bf95f68768a2dc7\"" May 15 17:29:40.298228 systemd[1]: run-containerd-runc-k8s.io-2e574860da4ddc76aa727cd658381f2b728c3ae01634e82b7bf95f68768a2dc7-runc.qGTZS1.mount: Deactivated successfully. May 15 17:29:40.438202 env[1153]: time="2025-05-15T17:29:40.438115167Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:29:40.441171 env[1153]: time="2025-05-15T17:29:40.441143812Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:29:40.443199 env[1153]: time="2025-05-15T17:29:40.443174421Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:29:40.445256 env[1153]: time="2025-05-15T17:29:40.445230227Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:29:40.445620 env[1153]: time="2025-05-15T17:29:40.445593370Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505\"" May 15 17:29:40.450275 env[1153]: time="2025-05-15T17:29:40.450243235Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 15 17:29:40.453799 env[1153]: time="2025-05-15T17:29:40.453758525Z" level=info msg="CreateContainer within sandbox \"d351844f490206c95d79ac67268565cca021226fd34962267b52faf877a63d7b\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 15 17:29:40.479814 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount45224353.mount: Deactivated successfully. May 15 17:29:40.485307 env[1153]: time="2025-05-15T17:29:40.485265577Z" level=info msg="CreateContainer within sandbox \"d351844f490206c95d79ac67268565cca021226fd34962267b52faf877a63d7b\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"e88c6fa34d61c0ad92e66f0ead7470b2f4affc9e77792f79a719e5edd3de8752\"" May 15 17:29:40.486678 env[1153]: time="2025-05-15T17:29:40.486558187Z" level=info msg="StartContainer for \"e88c6fa34d61c0ad92e66f0ead7470b2f4affc9e77792f79a719e5edd3de8752\"" May 15 17:29:40.542690 systemd[1]: Started cri-containerd-e88c6fa34d61c0ad92e66f0ead7470b2f4affc9e77792f79a719e5edd3de8752.scope. May 15 17:29:40.563000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:40.563000 audit[2535]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fab513ef2f8 items=0 ppid=2383 pid=2535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:40.563000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538386336666133346436316330616439326536366630656164373437 May 15 17:29:40.563000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:40.563000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:40.563000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:40.563000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:40.563000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:40.563000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:40.563000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:40.563000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:40.563000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:40.563000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:40.563000 audit: BPF prog-id=108 op=LOAD May 15 17:29:40.563000 audit[2535]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000024898 items=0 ppid=2383 pid=2535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:40.563000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538386336666133346436316330616439326536366630656164373437 May 15 17:29:40.566000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:40.566000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:40.566000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:40.566000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:40.566000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:40.566000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:40.566000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:40.566000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:40.566000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:40.566000 audit: BPF prog-id=109 op=LOAD May 15 17:29:40.566000 audit[2535]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0000248e8 items=0 ppid=2383 pid=2535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:40.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538386336666133346436316330616439326536366630656164373437 May 15 17:29:40.567000 audit: BPF prog-id=109 op=UNLOAD May 15 17:29:40.567000 audit: BPF prog-id=108 op=UNLOAD May 15 17:29:40.567000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:40.567000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:40.567000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:40.567000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:40.567000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:40.567000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:40.567000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:40.567000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:40.567000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:40.567000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:40.567000 audit: BPF prog-id=110 op=LOAD May 15 17:29:40.567000 audit[2535]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000024978 items=0 ppid=2383 pid=2535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:40.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538386336666133346436316330616439326536366630656164373437 May 15 17:29:40.586697 env[1153]: time="2025-05-15T17:29:40.586636011Z" level=info msg="StartContainer for \"e88c6fa34d61c0ad92e66f0ead7470b2f4affc9e77792f79a719e5edd3de8752\" returns successfully" May 15 17:29:40.695837 kubelet[1449]: E0515 17:29:40.695654 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:41.036827 systemd-networkd[984]: cali4703b794c4d: Gained IPv6LL May 15 17:29:41.697709 kubelet[1449]: E0515 17:29:41.697560 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:42.698998 kubelet[1449]: E0515 17:29:42.698872 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:43.657957 kubelet[1449]: E0515 17:29:43.657881 1449 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:43.699834 kubelet[1449]: E0515 17:29:43.699744 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:44.700957 kubelet[1449]: E0515 17:29:44.700831 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:45.073343 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2480761959.mount: Deactivated successfully. May 15 17:29:45.701492 kubelet[1449]: E0515 17:29:45.701404 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:46.702871 kubelet[1449]: E0515 17:29:46.702615 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:47.319038 env[1153]: time="2025-05-15T17:29:47.318846080Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:29:47.322824 env[1153]: time="2025-05-15T17:29:47.322767788Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:29:47.327057 env[1153]: time="2025-05-15T17:29:47.326990872Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:29:47.331299 env[1153]: time="2025-05-15T17:29:47.331234674Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:29:47.333903 env[1153]: time="2025-05-15T17:29:47.333818940Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa\"" May 15 17:29:47.338261 env[1153]: time="2025-05-15T17:29:47.338204409Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 15 17:29:47.341059 env[1153]: time="2025-05-15T17:29:47.340981657Z" level=info msg="CreateContainer within sandbox \"2e574860da4ddc76aa727cd658381f2b728c3ae01634e82b7bf95f68768a2dc7\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" May 15 17:29:47.391181 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3545141199.mount: Deactivated successfully. May 15 17:29:47.406283 env[1153]: time="2025-05-15T17:29:47.406079978Z" level=info msg="CreateContainer within sandbox \"2e574860da4ddc76aa727cd658381f2b728c3ae01634e82b7bf95f68768a2dc7\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"c8d1f46e444390f1bb93fb631fb6d3629242adfaeaa47e2f118bc1eb4d3da5aa\"" May 15 17:29:47.408468 env[1153]: time="2025-05-15T17:29:47.407877636Z" level=info msg="StartContainer for \"c8d1f46e444390f1bb93fb631fb6d3629242adfaeaa47e2f118bc1eb4d3da5aa\"" May 15 17:29:47.461198 systemd[1]: Started cri-containerd-c8d1f46e444390f1bb93fb631fb6d3629242adfaeaa47e2f118bc1eb4d3da5aa.scope. May 15 17:29:47.482713 kernel: kauditd_printk_skb: 93 callbacks suppressed May 15 17:29:47.482946 kernel: audit: type=1400 audit(1747330187.475:686): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:47.483011 kernel: audit: type=1400 audit(1747330187.475:687): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:47.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:47.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:47.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:47.491114 kernel: audit: type=1400 audit(1747330187.476:688): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:47.491296 kernel: audit: type=1400 audit(1747330187.476:689): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:47.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:47.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:47.499891 kernel: audit: type=1400 audit(1747330187.476:690): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:47.499954 kernel: audit: type=1400 audit(1747330187.476:691): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:47.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:47.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:47.509137 kernel: audit: type=1400 audit(1747330187.476:692): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:47.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:47.515455 kernel: audit: type=1400 audit(1747330187.476:693): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:47.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:47.522108 kernel: audit: type=1400 audit(1747330187.476:694): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:47.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:47.528883 kernel: audit: type=1400 audit(1747330187.486:695): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:47.486000 audit: BPF prog-id=111 op=LOAD May 15 17:29:47.487000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:47.487000 audit[2587]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2492 pid=2587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:47.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338643166343665343434333930663162623933666236333166623664 May 15 17:29:47.487000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:47.487000 audit[2587]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2492 pid=2587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:47.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338643166343665343434333930663162623933666236333166623664 May 15 17:29:47.487000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:47.487000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:47.487000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:47.487000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:47.487000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:47.487000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:47.487000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:47.487000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:47.487000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:47.487000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:47.487000 audit: BPF prog-id=112 op=LOAD May 15 17:29:47.487000 audit[2587]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000324c10 items=0 ppid=2492 pid=2587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:47.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338643166343665343434333930663162623933666236333166623664 May 15 17:29:47.499000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:47.499000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:47.499000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:47.499000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:47.499000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:47.499000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:47.499000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:47.499000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:47.499000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:47.499000 audit: BPF prog-id=113 op=LOAD May 15 17:29:47.499000 audit[2587]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000324c58 items=0 ppid=2492 pid=2587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:47.499000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338643166343665343434333930663162623933666236333166623664 May 15 17:29:47.508000 audit: BPF prog-id=113 op=UNLOAD May 15 17:29:47.508000 audit: BPF prog-id=112 op=UNLOAD May 15 17:29:47.508000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:47.508000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:47.508000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:47.508000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:47.508000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:47.508000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:47.508000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:47.508000 audit[2587]: AVC avc: denied { perfmon } for pid=2587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:47.508000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:47.508000 audit[2587]: AVC avc: denied { bpf } for pid=2587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:47.508000 audit: BPF prog-id=114 op=LOAD May 15 17:29:47.508000 audit[2587]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000325068 items=0 ppid=2492 pid=2587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:47.508000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338643166343665343434333930663162623933666236333166623664 May 15 17:29:47.547935 env[1153]: time="2025-05-15T17:29:47.547873620Z" level=info msg="StartContainer for \"c8d1f46e444390f1bb93fb631fb6d3629242adfaeaa47e2f118bc1eb4d3da5aa\" returns successfully" May 15 17:29:47.704260 kubelet[1449]: E0515 17:29:47.703987 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:48.255910 kubelet[1449]: I0515 17:29:48.255585 1449 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-8587fbcb89-97phk" podStartSLOduration=17.709806975 podStartE2EDuration="25.255433823s" podCreationTimestamp="2025-05-15 17:29:23 +0000 UTC" firstStartedPulling="2025-05-15 17:29:39.790331892 +0000 UTC m=+36.995486806" lastFinishedPulling="2025-05-15 17:29:47.33595873 +0000 UTC m=+44.541113654" observedRunningTime="2025-05-15 17:29:48.254838164 +0000 UTC m=+45.459993198" watchObservedRunningTime="2025-05-15 17:29:48.255433823 +0000 UTC m=+45.460588787" May 15 17:29:48.366259 systemd[1]: run-containerd-runc-k8s.io-c8d1f46e444390f1bb93fb631fb6d3629242adfaeaa47e2f118bc1eb4d3da5aa-runc.slG5en.mount: Deactivated successfully. May 15 17:29:48.706294 kubelet[1449]: E0515 17:29:48.705261 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:49.530748 systemd[1]: run-containerd-runc-k8s.io-6550044178d82bef888e226eca8532382f000e0fefbd32a4f065d5c814c92df2-runc.odSnt3.mount: Deactivated successfully. May 15 17:29:49.706973 kubelet[1449]: E0515 17:29:49.706891 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:49.949373 env[1153]: time="2025-05-15T17:29:49.949144466Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:29:49.962455 env[1153]: time="2025-05-15T17:29:49.962368204Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:29:49.966603 env[1153]: time="2025-05-15T17:29:49.966536223Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:29:49.970512 env[1153]: time="2025-05-15T17:29:49.970413195Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:29:49.972869 env[1153]: time="2025-05-15T17:29:49.972767427Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9\"" May 15 17:29:49.979628 env[1153]: time="2025-05-15T17:29:49.979498380Z" level=info msg="CreateContainer within sandbox \"d351844f490206c95d79ac67268565cca021226fd34962267b52faf877a63d7b\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 15 17:29:49.999077 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1995564310.mount: Deactivated successfully. May 15 17:29:50.010338 env[1153]: time="2025-05-15T17:29:50.010263997Z" level=info msg="CreateContainer within sandbox \"d351844f490206c95d79ac67268565cca021226fd34962267b52faf877a63d7b\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"ea7ab2846c96532155a72a758765dc94959078f7fd5bb7707727384f026d0a56\"" May 15 17:29:50.011155 env[1153]: time="2025-05-15T17:29:50.011114173Z" level=info msg="StartContainer for \"ea7ab2846c96532155a72a758765dc94959078f7fd5bb7707727384f026d0a56\"" May 15 17:29:50.036962 systemd[1]: Started cri-containerd-ea7ab2846c96532155a72a758765dc94959078f7fd5bb7707727384f026d0a56.scope. May 15 17:29:50.061000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:50.061000 audit[2665]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7fc3d44d17e8 items=0 ppid=2383 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:50.061000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561376162323834366339363533323135356137326137353837363564 May 15 17:29:50.061000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:50.061000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:50.061000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:50.061000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:50.061000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:50.061000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:50.061000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:50.061000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:50.061000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:50.061000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:50.061000 audit: BPF prog-id=115 op=LOAD May 15 17:29:50.061000 audit[2665]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c0002c9b98 items=0 ppid=2383 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:50.061000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561376162323834366339363533323135356137326137353837363564 May 15 17:29:50.062000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:50.062000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:50.062000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:50.062000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:50.062000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:50.062000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:50.062000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:50.062000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:50.062000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:50.062000 audit: BPF prog-id=116 op=LOAD May 15 17:29:50.062000 audit[2665]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c0002c9be8 items=0 ppid=2383 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:50.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561376162323834366339363533323135356137326137353837363564 May 15 17:29:50.062000 audit: BPF prog-id=116 op=UNLOAD May 15 17:29:50.063000 audit: BPF prog-id=115 op=UNLOAD May 15 17:29:50.063000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:50.063000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:50.063000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:50.063000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:50.063000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:50.063000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:50.063000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:50.063000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:50.063000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:50.063000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:29:50.063000 audit: BPF prog-id=117 op=LOAD May 15 17:29:50.063000 audit[2665]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c0002c9c78 items=0 ppid=2383 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:29:50.063000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561376162323834366339363533323135356137326137353837363564 May 15 17:29:50.090112 env[1153]: time="2025-05-15T17:29:50.090051922Z" level=info msg="StartContainer for \"ea7ab2846c96532155a72a758765dc94959078f7fd5bb7707727384f026d0a56\" returns successfully" May 15 17:29:50.708173 kubelet[1449]: E0515 17:29:50.708058 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:50.864023 kubelet[1449]: I0515 17:29:50.863920 1449 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 15 17:29:50.864420 kubelet[1449]: I0515 17:29:50.864071 1449 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 15 17:29:51.709571 kubelet[1449]: E0515 17:29:51.709314 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:52.710855 kubelet[1449]: E0515 17:29:52.710790 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:53.712686 kubelet[1449]: E0515 17:29:53.712620 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:54.713513 kubelet[1449]: E0515 17:29:54.713385 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:55.714691 kubelet[1449]: E0515 17:29:55.714519 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:56.714822 kubelet[1449]: E0515 17:29:56.714735 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:57.715441 kubelet[1449]: E0515 17:29:57.715372 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:58.717267 kubelet[1449]: E0515 17:29:58.717201 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:29:59.718538 kubelet[1449]: E0515 17:29:59.718383 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:00.719023 kubelet[1449]: E0515 17:30:00.718960 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:01.001000 audit[2705]: NETFILTER_CFG table=filter:71 family=2 entries=20 op=nft_register_rule pid=2705 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 17:30:01.006752 kernel: kauditd_printk_skb: 90 callbacks suppressed May 15 17:30:01.006916 kernel: audit: type=1325 audit(1747330201.001:710): table=filter:71 family=2 entries=20 op=nft_register_rule pid=2705 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 17:30:01.001000 audit[2705]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffe490e0c60 a2=0 a3=7ffe490e0c4c items=0 ppid=1697 pid=2705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:30:01.034045 kernel: audit: type=1300 audit(1747330201.001:710): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffe490e0c60 a2=0 a3=7ffe490e0c4c items=0 ppid=1697 pid=2705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:30:01.037568 kernel: audit: type=1327 audit(1747330201.001:710): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 17:30:01.001000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 17:30:01.035000 audit[2705]: NETFILTER_CFG table=nat:72 family=2 entries=22 op=nft_register_rule pid=2705 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 17:30:01.050192 kubelet[1449]: I0515 17:30:01.048817 1449 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-7mk6b" podStartSLOduration=44.46840865 podStartE2EDuration="58.048760285s" podCreationTimestamp="2025-05-15 17:29:03 +0000 UTC" firstStartedPulling="2025-05-15 17:29:36.395050401 +0000 UTC m=+33.600205315" lastFinishedPulling="2025-05-15 17:29:49.975401985 +0000 UTC m=+47.180556950" observedRunningTime="2025-05-15 17:29:50.277726785 +0000 UTC m=+47.482881749" watchObservedRunningTime="2025-05-15 17:30:01.048760285 +0000 UTC m=+58.253915309" May 15 17:30:01.054451 kernel: audit: type=1325 audit(1747330201.035:711): table=nat:72 family=2 entries=22 op=nft_register_rule pid=2705 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 17:30:01.054954 kernel: audit: type=1300 audit(1747330201.035:711): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe490e0c60 a2=0 a3=0 items=0 ppid=1697 pid=2705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:30:01.035000 audit[2705]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe490e0c60 a2=0 a3=0 items=0 ppid=1697 pid=2705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:30:01.035000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 17:30:01.070520 kernel: audit: type=1327 audit(1747330201.035:711): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 17:30:01.083779 systemd[1]: Created slice kubepods-besteffort-pod2c2860a9_1e21_43c3_bccb_a9ef2a59aef2.slice. May 15 17:30:01.093000 audit[2710]: NETFILTER_CFG table=filter:73 family=2 entries=32 op=nft_register_rule pid=2710 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 17:30:01.093000 audit[2710]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7fffecbaaae0 a2=0 a3=7fffecbaaacc items=0 ppid=1697 pid=2710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:30:01.106337 kernel: audit: type=1325 audit(1747330201.093:712): table=filter:73 family=2 entries=32 op=nft_register_rule pid=2710 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 17:30:01.106416 kernel: audit: type=1300 audit(1747330201.093:712): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7fffecbaaae0 a2=0 a3=7fffecbaaacc items=0 ppid=1697 pid=2710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:30:01.106456 kernel: audit: type=1327 audit(1747330201.093:712): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 17:30:01.093000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 17:30:01.110000 audit[2710]: NETFILTER_CFG table=nat:74 family=2 entries=22 op=nft_register_rule pid=2710 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 17:30:01.110000 audit[2710]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fffecbaaae0 a2=0 a3=0 items=0 ppid=1697 pid=2710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:30:01.110000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 17:30:01.116173 kernel: audit: type=1325 audit(1747330201.110:713): table=nat:74 family=2 entries=22 op=nft_register_rule pid=2710 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 17:30:01.147472 kubelet[1449]: I0515 17:30:01.147377 1449 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/2c2860a9-1e21-43c3-bccb-a9ef2a59aef2-data\") pod \"nfs-server-provisioner-0\" (UID: \"2c2860a9-1e21-43c3-bccb-a9ef2a59aef2\") " pod="default/nfs-server-provisioner-0" May 15 17:30:01.148080 kubelet[1449]: I0515 17:30:01.148013 1449 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mzcrr\" (UniqueName: \"kubernetes.io/projected/2c2860a9-1e21-43c3-bccb-a9ef2a59aef2-kube-api-access-mzcrr\") pod \"nfs-server-provisioner-0\" (UID: \"2c2860a9-1e21-43c3-bccb-a9ef2a59aef2\") " pod="default/nfs-server-provisioner-0" May 15 17:30:01.392081 env[1153]: time="2025-05-15T17:30:01.390744944Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:2c2860a9-1e21-43c3-bccb-a9ef2a59aef2,Namespace:default,Attempt:0,}" May 15 17:30:01.720987 kubelet[1449]: E0515 17:30:01.720904 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:01.751857 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 17:30:01.752067 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready May 15 17:30:01.749367 systemd-networkd[984]: cali60e51b789ff: Link UP May 15 17:30:01.752874 systemd-networkd[984]: cali60e51b789ff: Gained carrier May 15 17:30:01.782512 env[1153]: 2025-05-15 17:30:01.526 [INFO][2713] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.218-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 2c2860a9-1e21-43c3-bccb-a9ef2a59aef2 1460 0 2025-05-15 17:30:01 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 172.24.4.218 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="ec3110f4368cf192ec86700c634b47d344b17f990d4e1a9572aad5f388497ac3" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.218-k8s-nfs--server--provisioner--0-" May 15 17:30:01.782512 env[1153]: 2025-05-15 17:30:01.526 [INFO][2713] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="ec3110f4368cf192ec86700c634b47d344b17f990d4e1a9572aad5f388497ac3" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.218-k8s-nfs--server--provisioner--0-eth0" May 15 17:30:01.782512 env[1153]: 2025-05-15 17:30:01.596 [INFO][2725] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ec3110f4368cf192ec86700c634b47d344b17f990d4e1a9572aad5f388497ac3" HandleID="k8s-pod-network.ec3110f4368cf192ec86700c634b47d344b17f990d4e1a9572aad5f388497ac3" Workload="172.24.4.218-k8s-nfs--server--provisioner--0-eth0" May 15 17:30:01.782512 env[1153]: 2025-05-15 17:30:01.627 [INFO][2725] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="ec3110f4368cf192ec86700c634b47d344b17f990d4e1a9572aad5f388497ac3" HandleID="k8s-pod-network.ec3110f4368cf192ec86700c634b47d344b17f990d4e1a9572aad5f388497ac3" Workload="172.24.4.218-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000286290), Attrs:map[string]string{"namespace":"default", "node":"172.24.4.218", "pod":"nfs-server-provisioner-0", "timestamp":"2025-05-15 17:30:01.596779682 +0000 UTC"}, Hostname:"172.24.4.218", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 17:30:01.782512 env[1153]: 2025-05-15 17:30:01.628 [INFO][2725] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 17:30:01.782512 env[1153]: 2025-05-15 17:30:01.628 [INFO][2725] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 17:30:01.782512 env[1153]: 2025-05-15 17:30:01.628 [INFO][2725] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.218' May 15 17:30:01.782512 env[1153]: 2025-05-15 17:30:01.635 [INFO][2725] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ec3110f4368cf192ec86700c634b47d344b17f990d4e1a9572aad5f388497ac3" host="172.24.4.218" May 15 17:30:01.782512 env[1153]: 2025-05-15 17:30:01.649 [INFO][2725] ipam/ipam.go 372: Looking up existing affinities for host host="172.24.4.218" May 15 17:30:01.782512 env[1153]: 2025-05-15 17:30:01.662 [INFO][2725] ipam/ipam.go 489: Trying affinity for 192.168.118.192/26 host="172.24.4.218" May 15 17:30:01.782512 env[1153]: 2025-05-15 17:30:01.667 [INFO][2725] ipam/ipam.go 155: Attempting to load block cidr=192.168.118.192/26 host="172.24.4.218" May 15 17:30:01.782512 env[1153]: 2025-05-15 17:30:01.672 [INFO][2725] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.118.192/26 host="172.24.4.218" May 15 17:30:01.782512 env[1153]: 2025-05-15 17:30:01.672 [INFO][2725] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.118.192/26 handle="k8s-pod-network.ec3110f4368cf192ec86700c634b47d344b17f990d4e1a9572aad5f388497ac3" host="172.24.4.218" May 15 17:30:01.782512 env[1153]: 2025-05-15 17:30:01.678 [INFO][2725] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.ec3110f4368cf192ec86700c634b47d344b17f990d4e1a9572aad5f388497ac3 May 15 17:30:01.782512 env[1153]: 2025-05-15 17:30:01.696 [INFO][2725] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.118.192/26 handle="k8s-pod-network.ec3110f4368cf192ec86700c634b47d344b17f990d4e1a9572aad5f388497ac3" host="172.24.4.218" May 15 17:30:01.782512 env[1153]: 2025-05-15 17:30:01.719 [INFO][2725] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.118.195/26] block=192.168.118.192/26 handle="k8s-pod-network.ec3110f4368cf192ec86700c634b47d344b17f990d4e1a9572aad5f388497ac3" host="172.24.4.218" May 15 17:30:01.782512 env[1153]: 2025-05-15 17:30:01.719 [INFO][2725] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.118.195/26] handle="k8s-pod-network.ec3110f4368cf192ec86700c634b47d344b17f990d4e1a9572aad5f388497ac3" host="172.24.4.218" May 15 17:30:01.782512 env[1153]: 2025-05-15 17:30:01.719 [INFO][2725] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 17:30:01.782512 env[1153]: 2025-05-15 17:30:01.719 [INFO][2725] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.118.195/26] IPv6=[] ContainerID="ec3110f4368cf192ec86700c634b47d344b17f990d4e1a9572aad5f388497ac3" HandleID="k8s-pod-network.ec3110f4368cf192ec86700c634b47d344b17f990d4e1a9572aad5f388497ac3" Workload="172.24.4.218-k8s-nfs--server--provisioner--0-eth0" May 15 17:30:01.784599 env[1153]: 2025-05-15 17:30:01.723 [INFO][2713] cni-plugin/k8s.go 386: Populated endpoint ContainerID="ec3110f4368cf192ec86700c634b47d344b17f990d4e1a9572aad5f388497ac3" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.218-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.218-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"2c2860a9-1e21-43c3-bccb-a9ef2a59aef2", ResourceVersion:"1460", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 17, 30, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.218", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.118.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 17:30:01.784599 env[1153]: 2025-05-15 17:30:01.724 [INFO][2713] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.118.195/32] ContainerID="ec3110f4368cf192ec86700c634b47d344b17f990d4e1a9572aad5f388497ac3" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.218-k8s-nfs--server--provisioner--0-eth0" May 15 17:30:01.784599 env[1153]: 2025-05-15 17:30:01.724 [INFO][2713] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="ec3110f4368cf192ec86700c634b47d344b17f990d4e1a9572aad5f388497ac3" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.218-k8s-nfs--server--provisioner--0-eth0" May 15 17:30:01.784599 env[1153]: 2025-05-15 17:30:01.754 [INFO][2713] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ec3110f4368cf192ec86700c634b47d344b17f990d4e1a9572aad5f388497ac3" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.218-k8s-nfs--server--provisioner--0-eth0" May 15 17:30:01.785429 env[1153]: 2025-05-15 17:30:01.761 [INFO][2713] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="ec3110f4368cf192ec86700c634b47d344b17f990d4e1a9572aad5f388497ac3" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.218-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.218-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"2c2860a9-1e21-43c3-bccb-a9ef2a59aef2", ResourceVersion:"1460", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 17, 30, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.218", ContainerID:"ec3110f4368cf192ec86700c634b47d344b17f990d4e1a9572aad5f388497ac3", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.118.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"06:cd:9c:12:ce:6c", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 17:30:01.785429 env[1153]: 2025-05-15 17:30:01.779 [INFO][2713] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="ec3110f4368cf192ec86700c634b47d344b17f990d4e1a9572aad5f388497ac3" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.218-k8s-nfs--server--provisioner--0-eth0" May 15 17:30:01.821282 env[1153]: time="2025-05-15T17:30:01.820337677Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 17:30:01.821282 env[1153]: time="2025-05-15T17:30:01.820500062Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 17:30:01.821282 env[1153]: time="2025-05-15T17:30:01.820544014Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 17:30:01.821282 env[1153]: time="2025-05-15T17:30:01.820918026Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ec3110f4368cf192ec86700c634b47d344b17f990d4e1a9572aad5f388497ac3 pid=2752 runtime=io.containerd.runc.v2 May 15 17:30:01.823000 audit[2754]: NETFILTER_CFG table=filter:75 family=2 entries=38 op=nft_register_chain pid=2754 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 17:30:01.823000 audit[2754]: SYSCALL arch=c000003e syscall=46 success=yes exit=19820 a0=3 a1=7ffd518ea460 a2=0 a3=7ffd518ea44c items=0 ppid=2132 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:30:01.823000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 17:30:01.846077 systemd[1]: Started cri-containerd-ec3110f4368cf192ec86700c634b47d344b17f990d4e1a9572aad5f388497ac3.scope. May 15 17:30:01.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:01.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:01.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:01.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:01.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:01.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:01.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:01.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:01.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:01.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:01.861000 audit: BPF prog-id=118 op=LOAD May 15 17:30:01.862000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:01.862000 audit[2762]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2752 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:30:01.862000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563333131306634333638636631393265633836373030633633346234 May 15 17:30:01.862000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:01.862000 audit[2762]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2752 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:30:01.862000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563333131306634333638636631393265633836373030633633346234 May 15 17:30:01.863000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:01.863000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:01.863000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:01.863000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:01.863000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:01.863000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:01.863000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:01.863000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:01.863000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:01.863000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:01.863000 audit: BPF prog-id=119 op=LOAD May 15 17:30:01.863000 audit[2762]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001e7a20 items=0 ppid=2752 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:30:01.863000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563333131306634333638636631393265633836373030633633346234 May 15 17:30:01.864000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:01.864000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:01.864000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:01.864000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:01.864000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:01.864000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:01.864000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:01.864000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:01.864000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:01.864000 audit: BPF prog-id=120 op=LOAD May 15 17:30:01.864000 audit[2762]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001e7a68 items=0 ppid=2752 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:30:01.864000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563333131306634333638636631393265633836373030633633346234 May 15 17:30:01.864000 audit: BPF prog-id=120 op=UNLOAD May 15 17:30:01.864000 audit: BPF prog-id=119 op=UNLOAD May 15 17:30:01.865000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:01.865000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:01.865000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:01.865000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:01.865000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:01.865000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:01.865000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:01.865000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:01.865000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:01.865000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:01.865000 audit: BPF prog-id=121 op=LOAD May 15 17:30:01.865000 audit[2762]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001e7e78 items=0 ppid=2752 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:30:01.865000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563333131306634333638636631393265633836373030633633346234 May 15 17:30:01.895444 env[1153]: time="2025-05-15T17:30:01.895392751Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:2c2860a9-1e21-43c3-bccb-a9ef2a59aef2,Namespace:default,Attempt:0,} returns sandbox id \"ec3110f4368cf192ec86700c634b47d344b17f990d4e1a9572aad5f388497ac3\"" May 15 17:30:01.897734 env[1153]: time="2025-05-15T17:30:01.897594083Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" May 15 17:30:02.282524 systemd[1]: run-containerd-runc-k8s.io-ec3110f4368cf192ec86700c634b47d344b17f990d4e1a9572aad5f388497ac3-runc.Jd0vwo.mount: Deactivated successfully. May 15 17:30:02.721364 kubelet[1449]: E0515 17:30:02.721301 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:03.657133 kubelet[1449]: E0515 17:30:03.657052 1449 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:03.721483 kubelet[1449]: E0515 17:30:03.721385 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:03.722368 env[1153]: time="2025-05-15T17:30:03.722236861Z" level=info msg="StopPodSandbox for \"04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7\"" May 15 17:30:03.789534 systemd-networkd[984]: cali60e51b789ff: Gained IPv6LL May 15 17:30:03.890470 env[1153]: 2025-05-15 17:30:03.823 [WARNING][2801] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.218-k8s-csi--node--driver--7mk6b-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a2c6d92b-36a3-4601-a9d0-56c12423f442", ResourceVersion:"1410", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 17, 29, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.218", ContainerID:"d351844f490206c95d79ac67268565cca021226fd34962267b52faf877a63d7b", Pod:"csi-node-driver-7mk6b", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.118.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"caliaa280464d33", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 17:30:03.890470 env[1153]: 2025-05-15 17:30:03.824 [INFO][2801] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7" May 15 17:30:03.890470 env[1153]: 2025-05-15 17:30:03.824 [INFO][2801] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7" iface="eth0" netns="" May 15 17:30:03.890470 env[1153]: 2025-05-15 17:30:03.824 [INFO][2801] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7" May 15 17:30:03.890470 env[1153]: 2025-05-15 17:30:03.824 [INFO][2801] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7" May 15 17:30:03.890470 env[1153]: 2025-05-15 17:30:03.851 [INFO][2808] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7" HandleID="k8s-pod-network.04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7" Workload="172.24.4.218-k8s-csi--node--driver--7mk6b-eth0" May 15 17:30:03.890470 env[1153]: 2025-05-15 17:30:03.851 [INFO][2808] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 17:30:03.890470 env[1153]: 2025-05-15 17:30:03.851 [INFO][2808] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 17:30:03.890470 env[1153]: 2025-05-15 17:30:03.875 [WARNING][2808] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7" HandleID="k8s-pod-network.04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7" Workload="172.24.4.218-k8s-csi--node--driver--7mk6b-eth0" May 15 17:30:03.890470 env[1153]: 2025-05-15 17:30:03.882 [INFO][2808] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7" HandleID="k8s-pod-network.04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7" Workload="172.24.4.218-k8s-csi--node--driver--7mk6b-eth0" May 15 17:30:03.890470 env[1153]: 2025-05-15 17:30:03.886 [INFO][2808] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 17:30:03.890470 env[1153]: 2025-05-15 17:30:03.888 [INFO][2801] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7" May 15 17:30:03.891747 env[1153]: time="2025-05-15T17:30:03.891689854Z" level=info msg="TearDown network for sandbox \"04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7\" successfully" May 15 17:30:03.891909 env[1153]: time="2025-05-15T17:30:03.891871685Z" level=info msg="StopPodSandbox for \"04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7\" returns successfully" May 15 17:30:03.893188 env[1153]: time="2025-05-15T17:30:03.893140968Z" level=info msg="RemovePodSandbox for \"04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7\"" May 15 17:30:03.893553 env[1153]: time="2025-05-15T17:30:03.893433987Z" level=info msg="Forcibly stopping sandbox \"04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7\"" May 15 17:30:04.049754 env[1153]: 2025-05-15 17:30:04.000 [WARNING][2827] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.218-k8s-csi--node--driver--7mk6b-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a2c6d92b-36a3-4601-a9d0-56c12423f442", ResourceVersion:"1410", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 17, 29, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.218", ContainerID:"d351844f490206c95d79ac67268565cca021226fd34962267b52faf877a63d7b", Pod:"csi-node-driver-7mk6b", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.118.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"caliaa280464d33", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 17:30:04.049754 env[1153]: 2025-05-15 17:30:04.000 [INFO][2827] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7" May 15 17:30:04.049754 env[1153]: 2025-05-15 17:30:04.000 [INFO][2827] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7" iface="eth0" netns="" May 15 17:30:04.049754 env[1153]: 2025-05-15 17:30:04.000 [INFO][2827] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7" May 15 17:30:04.049754 env[1153]: 2025-05-15 17:30:04.000 [INFO][2827] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7" May 15 17:30:04.049754 env[1153]: 2025-05-15 17:30:04.027 [INFO][2836] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7" HandleID="k8s-pod-network.04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7" Workload="172.24.4.218-k8s-csi--node--driver--7mk6b-eth0" May 15 17:30:04.049754 env[1153]: 2025-05-15 17:30:04.027 [INFO][2836] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 17:30:04.049754 env[1153]: 2025-05-15 17:30:04.027 [INFO][2836] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 17:30:04.049754 env[1153]: 2025-05-15 17:30:04.044 [WARNING][2836] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7" HandleID="k8s-pod-network.04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7" Workload="172.24.4.218-k8s-csi--node--driver--7mk6b-eth0" May 15 17:30:04.049754 env[1153]: 2025-05-15 17:30:04.044 [INFO][2836] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7" HandleID="k8s-pod-network.04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7" Workload="172.24.4.218-k8s-csi--node--driver--7mk6b-eth0" May 15 17:30:04.049754 env[1153]: 2025-05-15 17:30:04.047 [INFO][2836] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 17:30:04.049754 env[1153]: 2025-05-15 17:30:04.048 [INFO][2827] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7" May 15 17:30:04.050612 env[1153]: time="2025-05-15T17:30:04.050574412Z" level=info msg="TearDown network for sandbox \"04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7\" successfully" May 15 17:30:04.059293 env[1153]: time="2025-05-15T17:30:04.059265010Z" level=info msg="RemovePodSandbox \"04a9d4c88760173bf8d68331f8fc9ba549ea448debfb0e83d561a433263f13a7\" returns successfully" May 15 17:30:04.059904 env[1153]: time="2025-05-15T17:30:04.059879413Z" level=info msg="StopPodSandbox for \"77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54\"" May 15 17:30:04.196358 env[1153]: 2025-05-15 17:30:04.145 [WARNING][2856] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.218-k8s-nginx--deployment--8587fbcb89--97phk-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"70454114-2fbd-4caf-8b7d-ec037621b9c6", ResourceVersion:"1397", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 17, 29, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.218", ContainerID:"2e574860da4ddc76aa727cd658381f2b728c3ae01634e82b7bf95f68768a2dc7", Pod:"nginx-deployment-8587fbcb89-97phk", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.118.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali4703b794c4d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 17:30:04.196358 env[1153]: 2025-05-15 17:30:04.145 [INFO][2856] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54" May 15 17:30:04.196358 env[1153]: 2025-05-15 17:30:04.145 [INFO][2856] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54" iface="eth0" netns="" May 15 17:30:04.196358 env[1153]: 2025-05-15 17:30:04.145 [INFO][2856] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54" May 15 17:30:04.196358 env[1153]: 2025-05-15 17:30:04.145 [INFO][2856] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54" May 15 17:30:04.196358 env[1153]: 2025-05-15 17:30:04.173 [INFO][2863] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54" HandleID="k8s-pod-network.77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54" Workload="172.24.4.218-k8s-nginx--deployment--8587fbcb89--97phk-eth0" May 15 17:30:04.196358 env[1153]: 2025-05-15 17:30:04.173 [INFO][2863] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 17:30:04.196358 env[1153]: 2025-05-15 17:30:04.173 [INFO][2863] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 17:30:04.196358 env[1153]: 2025-05-15 17:30:04.190 [WARNING][2863] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54" HandleID="k8s-pod-network.77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54" Workload="172.24.4.218-k8s-nginx--deployment--8587fbcb89--97phk-eth0" May 15 17:30:04.196358 env[1153]: 2025-05-15 17:30:04.190 [INFO][2863] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54" HandleID="k8s-pod-network.77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54" Workload="172.24.4.218-k8s-nginx--deployment--8587fbcb89--97phk-eth0" May 15 17:30:04.196358 env[1153]: 2025-05-15 17:30:04.194 [INFO][2863] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 17:30:04.196358 env[1153]: 2025-05-15 17:30:04.195 [INFO][2856] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54" May 15 17:30:04.197249 env[1153]: time="2025-05-15T17:30:04.197206929Z" level=info msg="TearDown network for sandbox \"77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54\" successfully" May 15 17:30:04.197335 env[1153]: time="2025-05-15T17:30:04.197315122Z" level=info msg="StopPodSandbox for \"77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54\" returns successfully" May 15 17:30:04.199122 env[1153]: time="2025-05-15T17:30:04.199074003Z" level=info msg="RemovePodSandbox for \"77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54\"" May 15 17:30:04.199241 env[1153]: time="2025-05-15T17:30:04.199198716Z" level=info msg="Forcibly stopping sandbox \"77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54\"" May 15 17:30:04.333261 env[1153]: 2025-05-15 17:30:04.263 [WARNING][2884] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.218-k8s-nginx--deployment--8587fbcb89--97phk-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"70454114-2fbd-4caf-8b7d-ec037621b9c6", ResourceVersion:"1397", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 17, 29, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.218", ContainerID:"2e574860da4ddc76aa727cd658381f2b728c3ae01634e82b7bf95f68768a2dc7", Pod:"nginx-deployment-8587fbcb89-97phk", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.118.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali4703b794c4d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 17:30:04.333261 env[1153]: 2025-05-15 17:30:04.264 [INFO][2884] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54" May 15 17:30:04.333261 env[1153]: 2025-05-15 17:30:04.264 [INFO][2884] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54" iface="eth0" netns="" May 15 17:30:04.333261 env[1153]: 2025-05-15 17:30:04.264 [INFO][2884] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54" May 15 17:30:04.333261 env[1153]: 2025-05-15 17:30:04.264 [INFO][2884] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54" May 15 17:30:04.333261 env[1153]: 2025-05-15 17:30:04.289 [INFO][2891] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54" HandleID="k8s-pod-network.77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54" Workload="172.24.4.218-k8s-nginx--deployment--8587fbcb89--97phk-eth0" May 15 17:30:04.333261 env[1153]: 2025-05-15 17:30:04.289 [INFO][2891] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 17:30:04.333261 env[1153]: 2025-05-15 17:30:04.290 [INFO][2891] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 17:30:04.333261 env[1153]: 2025-05-15 17:30:04.323 [WARNING][2891] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54" HandleID="k8s-pod-network.77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54" Workload="172.24.4.218-k8s-nginx--deployment--8587fbcb89--97phk-eth0" May 15 17:30:04.333261 env[1153]: 2025-05-15 17:30:04.324 [INFO][2891] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54" HandleID="k8s-pod-network.77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54" Workload="172.24.4.218-k8s-nginx--deployment--8587fbcb89--97phk-eth0" May 15 17:30:04.333261 env[1153]: 2025-05-15 17:30:04.328 [INFO][2891] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 17:30:04.333261 env[1153]: 2025-05-15 17:30:04.329 [INFO][2884] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54" May 15 17:30:04.333261 env[1153]: time="2025-05-15T17:30:04.331399732Z" level=info msg="TearDown network for sandbox \"77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54\" successfully" May 15 17:30:04.335055 env[1153]: time="2025-05-15T17:30:04.335012121Z" level=info msg="RemovePodSandbox \"77238c72f2535fb4668a23a2c51f1b6ffc00a64ac6cb32806fee32f635cbea54\" returns successfully" May 15 17:30:04.722595 kubelet[1449]: E0515 17:30:04.722538 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:05.723787 kubelet[1449]: E0515 17:30:05.723730 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:05.969618 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount906728469.mount: Deactivated successfully. May 15 17:30:06.724057 kubelet[1449]: E0515 17:30:06.723941 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:07.724870 kubelet[1449]: E0515 17:30:07.724812 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:08.725305 kubelet[1449]: E0515 17:30:08.725223 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:09.632591 env[1153]: time="2025-05-15T17:30:09.632459211Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:30:09.635767 env[1153]: time="2025-05-15T17:30:09.635702256Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:30:09.639508 env[1153]: time="2025-05-15T17:30:09.639459085Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:30:09.643348 env[1153]: time="2025-05-15T17:30:09.643324027Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:30:09.645446 env[1153]: time="2025-05-15T17:30:09.645375235Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" May 15 17:30:09.650259 env[1153]: time="2025-05-15T17:30:09.649950269Z" level=info msg="CreateContainer within sandbox \"ec3110f4368cf192ec86700c634b47d344b17f990d4e1a9572aad5f388497ac3\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" May 15 17:30:09.677331 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4176816532.mount: Deactivated successfully. May 15 17:30:09.702964 env[1153]: time="2025-05-15T17:30:09.702839584Z" level=info msg="CreateContainer within sandbox \"ec3110f4368cf192ec86700c634b47d344b17f990d4e1a9572aad5f388497ac3\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"556c80b946a416b42604fdd1dc687e7dc1e6b0296aa4c683decd09248d7ca71f\"" May 15 17:30:09.705759 env[1153]: time="2025-05-15T17:30:09.705690995Z" level=info msg="StartContainer for \"556c80b946a416b42604fdd1dc687e7dc1e6b0296aa4c683decd09248d7ca71f\"" May 15 17:30:09.729015 kubelet[1449]: E0515 17:30:09.728857 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:09.762920 systemd[1]: Started cri-containerd-556c80b946a416b42604fdd1dc687e7dc1e6b0296aa4c683decd09248d7ca71f.scope. May 15 17:30:09.785097 kernel: kauditd_printk_skb: 62 callbacks suppressed May 15 17:30:09.785277 kernel: audit: type=1400 audit(1747330209.779:733): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:09.785325 kernel: audit: type=1400 audit(1747330209.779:734): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:09.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:09.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:09.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:09.793749 kernel: audit: type=1400 audit(1747330209.779:735): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:09.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:09.798336 kernel: audit: type=1400 audit(1747330209.779:736): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:09.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:09.803157 kernel: audit: type=1400 audit(1747330209.779:737): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:09.803213 kernel: audit: type=1400 audit(1747330209.779:738): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:09.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:09.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:09.812804 kernel: audit: type=1400 audit(1747330209.779:739): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:09.812863 kernel: audit: type=1400 audit(1747330209.779:740): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:09.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:09.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:09.822270 kernel: audit: type=1400 audit(1747330209.779:741): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:09.822571 kernel: audit: type=1400 audit(1747330209.789:742): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:09.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:09.789000 audit: BPF prog-id=122 op=LOAD May 15 17:30:09.794000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:09.794000 audit[2911]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2752 pid=2911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:30:09.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535366338306239343661343136623432363034666464316463363837 May 15 17:30:09.794000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:09.794000 audit[2911]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2752 pid=2911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:30:09.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535366338306239343661343136623432363034666464316463363837 May 15 17:30:09.794000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:09.794000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:09.794000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:09.794000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:09.794000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:09.794000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:09.794000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:09.794000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:09.794000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:09.794000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:09.794000 audit: BPF prog-id=123 op=LOAD May 15 17:30:09.794000 audit[2911]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002354d0 items=0 ppid=2752 pid=2911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:30:09.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535366338306239343661343136623432363034666464316463363837 May 15 17:30:09.798000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:09.798000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:09.798000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:09.798000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:09.798000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:09.798000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:09.798000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:09.798000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:09.798000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:09.798000 audit: BPF prog-id=124 op=LOAD May 15 17:30:09.798000 audit[2911]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000235518 items=0 ppid=2752 pid=2911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:30:09.798000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535366338306239343661343136623432363034666464316463363837 May 15 17:30:09.807000 audit: BPF prog-id=124 op=UNLOAD May 15 17:30:09.807000 audit: BPF prog-id=123 op=UNLOAD May 15 17:30:09.807000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:09.807000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:09.807000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:09.807000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:09.807000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:09.807000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:09.807000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:09.807000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:09.807000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:09.807000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:09.807000 audit: BPF prog-id=125 op=LOAD May 15 17:30:09.807000 audit[2911]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000235928 items=0 ppid=2752 pid=2911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:30:09.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535366338306239343661343136623432363034666464316463363837 May 15 17:30:09.847385 env[1153]: time="2025-05-15T17:30:09.847329568Z" level=info msg="StartContainer for \"556c80b946a416b42604fdd1dc687e7dc1e6b0296aa4c683decd09248d7ca71f\" returns successfully" May 15 17:30:09.895000 audit[2939]: AVC avc: denied { search } for pid=2939 comm="rpcbind" name="crypto" dev="proc" ino=22147 scontext=system_u:system_r:svirt_lxc_net_t:s0:c370,c951 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 15 17:30:09.895000 audit[2939]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fed462230c0 a2=0 a3=0 items=0 ppid=2922 pid=2939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c370,c951 key=(null) May 15 17:30:09.895000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 May 15 17:30:09.939000 audit[2944]: AVC avc: denied { search } for pid=2944 comm="dbus-daemon" name="crypto" dev="proc" ino=22147 scontext=system_u:system_r:svirt_lxc_net_t:s0:c370,c951 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 15 17:30:09.939000 audit[2944]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f44770b20c0 a2=0 a3=0 items=0 ppid=2922 pid=2944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c370,c951 key=(null) May 15 17:30:09.939000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 15 17:30:09.944000 audit[2945]: AVC avc: denied { watch } for pid=2945 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538200 scontext=system_u:system_r:svirt_lxc_net_t:s0:c370,c951 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c370,c951 tclass=dir permissive=0 May 15 17:30:09.944000 audit[2945]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55e790f9d800 a2=2c8 a3=7fff86f303fc items=0 ppid=2922 pid=2945 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c370,c951 key=(null) May 15 17:30:09.944000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 15 17:30:09.948000 audit[2946]: AVC avc: denied { read } for pid=2946 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=22170 scontext=system_u:system_r:svirt_lxc_net_t:s0:c370,c951 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 May 15 17:30:09.948000 audit[2946]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f2f6fc7f320 a1=80000 a2=d a3=7ffe121a0770 items=0 ppid=2922 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c370,c951 key=(null) May 15 17:30:09.948000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 15 17:30:09.949000 audit[2946]: AVC avc: denied { search } for pid=2946 comm="ganesha.nfsd" name="crypto" dev="proc" ino=22147 scontext=system_u:system_r:svirt_lxc_net_t:s0:c370,c951 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 15 17:30:09.949000 audit[2946]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f2f6f1d30c0 a2=0 a3=0 items=0 ppid=2922 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c370,c951 key=(null) May 15 17:30:09.949000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 15 17:30:10.386548 kubelet[1449]: I0515 17:30:10.386439 1449 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.635946581 podStartE2EDuration="9.386397462s" podCreationTimestamp="2025-05-15 17:30:01 +0000 UTC" firstStartedPulling="2025-05-15 17:30:01.897221514 +0000 UTC m=+59.102376438" lastFinishedPulling="2025-05-15 17:30:09.647672405 +0000 UTC m=+66.852827319" observedRunningTime="2025-05-15 17:30:10.385002995 +0000 UTC m=+67.590157959" watchObservedRunningTime="2025-05-15 17:30:10.386397462 +0000 UTC m=+67.591552426" May 15 17:30:10.420000 audit[2951]: NETFILTER_CFG table=filter:76 family=2 entries=20 op=nft_register_rule pid=2951 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 17:30:10.420000 audit[2951]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffe8d6b5080 a2=0 a3=7ffe8d6b506c items=0 ppid=1697 pid=2951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:30:10.420000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 17:30:10.429000 audit[2951]: NETFILTER_CFG table=nat:77 family=2 entries=106 op=nft_register_chain pid=2951 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 17:30:10.429000 audit[2951]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffe8d6b5080 a2=0 a3=7ffe8d6b506c items=0 ppid=1697 pid=2951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:30:10.429000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 17:30:10.669726 systemd[1]: run-containerd-runc-k8s.io-556c80b946a416b42604fdd1dc687e7dc1e6b0296aa4c683decd09248d7ca71f-runc.HcdYrS.mount: Deactivated successfully. May 15 17:30:10.730270 kubelet[1449]: E0515 17:30:10.730161 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:11.731413 kubelet[1449]: E0515 17:30:11.731348 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:12.733014 kubelet[1449]: E0515 17:30:12.732859 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:13.736237 kubelet[1449]: E0515 17:30:13.736038 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:14.737281 kubelet[1449]: E0515 17:30:14.737189 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:15.737827 kubelet[1449]: E0515 17:30:15.737761 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:16.739273 kubelet[1449]: E0515 17:30:16.739046 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:17.739756 kubelet[1449]: E0515 17:30:17.739693 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:18.741278 kubelet[1449]: E0515 17:30:18.741218 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:19.742937 kubelet[1449]: E0515 17:30:19.742830 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:20.743693 kubelet[1449]: E0515 17:30:20.743610 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:21.745722 kubelet[1449]: E0515 17:30:21.745559 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:22.746656 kubelet[1449]: E0515 17:30:22.746536 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:23.657889 kubelet[1449]: E0515 17:30:23.657802 1449 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:23.747685 kubelet[1449]: E0515 17:30:23.747585 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:24.747916 kubelet[1449]: E0515 17:30:24.747785 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:25.748379 kubelet[1449]: E0515 17:30:25.748308 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:26.750359 kubelet[1449]: E0515 17:30:26.750276 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:27.750956 kubelet[1449]: E0515 17:30:27.750846 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:28.751945 kubelet[1449]: E0515 17:30:28.751862 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:29.752767 kubelet[1449]: E0515 17:30:29.752624 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:30.753640 kubelet[1449]: E0515 17:30:30.753472 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:31.754608 kubelet[1449]: E0515 17:30:31.754531 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:32.755267 kubelet[1449]: E0515 17:30:32.755207 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:33.757158 kubelet[1449]: E0515 17:30:33.757007 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:34.461556 systemd[1]: Created slice kubepods-besteffort-pod143f3699_c814_49ca_a669_a54ec940e31c.slice. May 15 17:30:34.607075 kubelet[1449]: I0515 17:30:34.606975 1449 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-1cbd250e-4cf2-41c3-bfcc-e84701fb662b\" (UniqueName: \"kubernetes.io/nfs/143f3699-c814-49ca-a669-a54ec940e31c-pvc-1cbd250e-4cf2-41c3-bfcc-e84701fb662b\") pod \"test-pod-1\" (UID: \"143f3699-c814-49ca-a669-a54ec940e31c\") " pod="default/test-pod-1" May 15 17:30:34.607523 kubelet[1449]: I0515 17:30:34.607472 1449 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9wnqs\" (UniqueName: \"kubernetes.io/projected/143f3699-c814-49ca-a669-a54ec940e31c-kube-api-access-9wnqs\") pod \"test-pod-1\" (UID: \"143f3699-c814-49ca-a669-a54ec940e31c\") " pod="default/test-pod-1" May 15 17:30:34.762543 kubelet[1449]: E0515 17:30:34.762120 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:34.794591 kernel: Failed to create system directory netfs May 15 17:30:34.795304 kernel: kauditd_printk_skb: 68 callbacks suppressed May 15 17:30:34.795417 kernel: audit: type=1400 audit(1747330234.776:758): avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.776000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.809284 kernel: Failed to create system directory netfs May 15 17:30:34.809415 kernel: audit: type=1400 audit(1747330234.776:758): avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.776000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.817157 kernel: Failed to create system directory netfs May 15 17:30:34.817289 kernel: audit: type=1400 audit(1747330234.776:758): avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.776000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.825277 kernel: Failed to create system directory netfs May 15 17:30:34.825366 kernel: audit: type=1400 audit(1747330234.776:758): avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.776000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.776000 audit[3008]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55ea6dd4a5e0 a1=153bc a2=55ea3cf0f2b0 a3=5 items=0 ppid=465 pid=3008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:30:34.776000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 15 17:30:34.851543 kernel: audit: type=1300 audit(1747330234.776:758): arch=c000003e syscall=175 success=yes exit=0 a0=55ea6dd4a5e0 a1=153bc a2=55ea3cf0f2b0 a3=5 items=0 ppid=465 pid=3008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:30:34.851709 kernel: audit: type=1327 audit(1747330234.776:758): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 15 17:30:34.860879 kernel: Failed to create system directory fscache May 15 17:30:34.860950 kernel: audit: type=1400 audit(1747330234.849:759): avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.861020 kernel: Failed to create system directory fscache May 15 17:30:34.849000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.867513 kernel: audit: type=1400 audit(1747330234.849:759): avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.867577 kernel: Failed to create system directory fscache May 15 17:30:34.849000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.873799 kernel: audit: type=1400 audit(1747330234.849:759): avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.873876 kernel: Failed to create system directory fscache May 15 17:30:34.849000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.880368 kernel: audit: type=1400 audit(1747330234.849:759): avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.880427 kernel: Failed to create system directory fscache May 15 17:30:34.849000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.849000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.849000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.882948 kernel: Failed to create system directory fscache May 15 17:30:34.883001 kernel: Failed to create system directory fscache May 15 17:30:34.849000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.849000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.885432 kernel: Failed to create system directory fscache May 15 17:30:34.885467 kernel: Failed to create system directory fscache May 15 17:30:34.849000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.849000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.887908 kernel: Failed to create system directory fscache May 15 17:30:34.887965 kernel: Failed to create system directory fscache May 15 17:30:34.849000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.849000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.890468 kernel: Failed to create system directory fscache May 15 17:30:34.890518 kernel: Failed to create system directory fscache May 15 17:30:34.849000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.849000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.893133 kernel: Failed to create system directory fscache May 15 17:30:34.849000 audit[3008]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55ea6df5f9c0 a1=4c0fc a2=55ea3cf0f2b0 a3=5 items=0 ppid=465 pid=3008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:30:34.849000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 15 17:30:34.896129 kernel: FS-Cache: Loaded May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.951157 kernel: Failed to create system directory sunrpc May 15 17:30:34.951310 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.953651 kernel: Failed to create system directory sunrpc May 15 17:30:34.953726 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.954878 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.956183 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.957343 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.962209 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.964729 kernel: Failed to create system directory sunrpc May 15 17:30:34.964807 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.967218 kernel: Failed to create system directory sunrpc May 15 17:30:34.967337 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.968568 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.971232 kernel: Failed to create system directory sunrpc May 15 17:30:34.971494 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.972653 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.973999 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.975269 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.976588 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.977926 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.981034 kernel: Failed to create system directory sunrpc May 15 17:30:34.981284 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.984002 kernel: Failed to create system directory sunrpc May 15 17:30:34.984154 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.986496 kernel: Failed to create system directory sunrpc May 15 17:30:34.986604 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.989139 kernel: Failed to create system directory sunrpc May 15 17:30:34.989246 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.991563 kernel: Failed to create system directory sunrpc May 15 17:30:34.991698 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.994216 kernel: Failed to create system directory sunrpc May 15 17:30:34.994331 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.996823 kernel: Failed to create system directory sunrpc May 15 17:30:34.996932 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.999323 kernel: Failed to create system directory sunrpc May 15 17:30:34.999427 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.002005 kernel: Failed to create system directory sunrpc May 15 17:30:35.002171 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.004672 kernel: Failed to create system directory sunrpc May 15 17:30:35.004780 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.007171 kernel: Failed to create system directory sunrpc May 15 17:30:35.007334 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.009782 kernel: Failed to create system directory sunrpc May 15 17:30:35.009961 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.012435 kernel: Failed to create system directory sunrpc May 15 17:30:35.012592 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.019503 kernel: Failed to create system directory sunrpc May 15 17:30:35.019716 kernel: Failed to create system directory sunrpc May 15 17:30:35.019817 kernel: Failed to create system directory sunrpc May 15 17:30:35.019889 kernel: Failed to create system directory sunrpc May 15 17:30:35.019959 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.021854 kernel: Failed to create system directory sunrpc May 15 17:30:35.021961 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.024351 kernel: Failed to create system directory sunrpc May 15 17:30:35.024574 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.025905 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.028530 kernel: Failed to create system directory sunrpc May 15 17:30:35.028698 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.031018 kernel: Failed to create system directory sunrpc May 15 17:30:35.031245 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.033592 kernel: Failed to create system directory sunrpc May 15 17:30:35.033787 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.036465 kernel: Failed to create system directory sunrpc May 15 17:30:35.036626 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.037625 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.038855 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.040134 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.041268 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.042656 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.045261 kernel: Failed to create system directory sunrpc May 15 17:30:35.045530 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.047763 kernel: Failed to create system directory sunrpc May 15 17:30:35.048030 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.050358 kernel: Failed to create system directory sunrpc May 15 17:30:35.050598 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.051584 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.053061 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.055749 kernel: Failed to create system directory sunrpc May 15 17:30:35.055928 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.058309 kernel: Failed to create system directory sunrpc May 15 17:30:35.058447 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.059433 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.060753 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.063261 kernel: Failed to create system directory sunrpc May 15 17:30:35.063400 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.066058 kernel: Failed to create system directory sunrpc May 15 17:30:35.066277 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.068654 kernel: Failed to create system directory sunrpc May 15 17:30:35.068923 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.071080 kernel: Failed to create system directory sunrpc May 15 17:30:35.071289 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.073642 kernel: Failed to create system directory sunrpc May 15 17:30:35.073818 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.074788 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.076195 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.078686 kernel: Failed to create system directory sunrpc May 15 17:30:35.078836 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.080029 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.081255 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.082600 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.083962 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.085290 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.086595 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.087936 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.089259 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.090486 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.091730 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.093059 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.094358 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.095598 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.096885 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.098249 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.099493 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.102242 kernel: Failed to create system directory sunrpc May 15 17:30:35.102421 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.103436 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.104806 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.105965 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.107282 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.109893 kernel: Failed to create system directory sunrpc May 15 17:30:35.110071 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.111009 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.112415 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.114929 kernel: Failed to create system directory sunrpc May 15 17:30:35.115060 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.116257 kernel: Failed to create system directory sunrpc May 15 17:30:34.932000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.132910 kernel: RPC: Registered named UNIX socket transport module. May 15 17:30:35.133140 kernel: RPC: Registered udp transport module. May 15 17:30:35.133238 kernel: RPC: Registered tcp transport module. May 15 17:30:35.134168 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. May 15 17:30:34.932000 audit[3008]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55ea6dfabad0 a1=1a814c a2=55ea3cf0f2b0 a3=5 items=6 ppid=465 pid=3008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:30:34.932000 audit: CWD cwd="/" May 15 17:30:34.932000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:30:34.932000 audit: PATH item=1 name=(null) inode=22366 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:30:34.932000 audit: PATH item=2 name=(null) inode=22366 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:30:34.932000 audit: PATH item=3 name=(null) inode=22367 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:30:34.932000 audit: PATH item=4 name=(null) inode=22366 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:30:34.932000 audit: PATH item=5 name=(null) inode=22368 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 17:30:34.932000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.191229 kernel: Failed to create system directory nfs May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.193872 kernel: Failed to create system directory nfs May 15 17:30:35.193922 kernel: Failed to create system directory nfs May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.195271 kernel: Failed to create system directory nfs May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.196633 kernel: Failed to create system directory nfs May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.197968 kernel: Failed to create system directory nfs May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.200678 kernel: Failed to create system directory nfs May 15 17:30:35.200783 kernel: Failed to create system directory nfs May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.202139 kernel: Failed to create system directory nfs May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.203421 kernel: Failed to create system directory nfs May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.204746 kernel: Failed to create system directory nfs May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.206122 kernel: Failed to create system directory nfs May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.207409 kernel: Failed to create system directory nfs May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.208753 kernel: Failed to create system directory nfs May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.210034 kernel: Failed to create system directory nfs May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.212548 kernel: Failed to create system directory nfs May 15 17:30:35.212607 kernel: Failed to create system directory nfs May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.213864 kernel: Failed to create system directory nfs May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.215137 kernel: Failed to create system directory nfs May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.216606 kernel: Failed to create system directory nfs May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.217905 kernel: Failed to create system directory nfs May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.219250 kernel: Failed to create system directory nfs May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.220550 kernel: Failed to create system directory nfs May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.221802 kernel: Failed to create system directory nfs May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.223070 kernel: Failed to create system directory nfs May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.225698 kernel: Failed to create system directory nfs May 15 17:30:35.225757 kernel: Failed to create system directory nfs May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.227074 kernel: Failed to create system directory nfs May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.229852 kernel: Failed to create system directory nfs May 15 17:30:35.229890 kernel: Failed to create system directory nfs May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.231210 kernel: Failed to create system directory nfs May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.232594 kernel: Failed to create system directory nfs May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.233878 kernel: Failed to create system directory nfs May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.235117 kernel: Failed to create system directory nfs May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.236506 kernel: Failed to create system directory nfs May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.237812 kernel: Failed to create system directory nfs May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.239200 kernel: Failed to create system directory nfs May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.240692 kernel: Failed to create system directory nfs May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.242022 kernel: Failed to create system directory nfs May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.244678 kernel: Failed to create system directory nfs May 15 17:30:35.244740 kernel: Failed to create system directory nfs May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.246067 kernel: Failed to create system directory nfs May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.248792 kernel: Failed to create system directory nfs May 15 17:30:35.248852 kernel: Failed to create system directory nfs May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.250143 kernel: Failed to create system directory nfs May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.251439 kernel: Failed to create system directory nfs May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.252828 kernel: Failed to create system directory nfs May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.254186 kernel: Failed to create system directory nfs May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.255423 kernel: Failed to create system directory nfs May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.256838 kernel: Failed to create system directory nfs May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.258222 kernel: Failed to create system directory nfs May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.259628 kernel: Failed to create system directory nfs May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.261058 kernel: Failed to create system directory nfs May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.263777 kernel: Failed to create system directory nfs May 15 17:30:35.263856 kernel: Failed to create system directory nfs May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.265257 kernel: Failed to create system directory nfs May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.270523 kernel: Failed to create system directory nfs May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.272059 kernel: Failed to create system directory nfs May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.274908 kernel: Failed to create system directory nfs May 15 17:30:35.274990 kernel: Failed to create system directory nfs May 15 17:30:35.177000 audit[3008]: AVC avc: denied { confidentiality } for pid=3008 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.304141 kernel: FS-Cache: Netfs 'nfs' registered for caching May 15 17:30:35.177000 audit[3008]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55ea6e1cca10 a1=16eae4 a2=55ea3cf0f2b0 a3=5 items=0 ppid=465 pid=3008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:30:35.177000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.358178 kernel: Failed to create system directory nfs4 May 15 17:30:35.358370 kernel: Failed to create system directory nfs4 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.360759 kernel: Failed to create system directory nfs4 May 15 17:30:35.360906 kernel: Failed to create system directory nfs4 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.363166 kernel: Failed to create system directory nfs4 May 15 17:30:35.363278 kernel: Failed to create system directory nfs4 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.366163 kernel: Failed to create system directory nfs4 May 15 17:30:35.366635 kernel: Failed to create system directory nfs4 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.367618 kernel: Failed to create system directory nfs4 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.370518 kernel: Failed to create system directory nfs4 May 15 17:30:35.370628 kernel: Failed to create system directory nfs4 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.371869 kernel: Failed to create system directory nfs4 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.374485 kernel: Failed to create system directory nfs4 May 15 17:30:35.374568 kernel: Failed to create system directory nfs4 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.377299 kernel: Failed to create system directory nfs4 May 15 17:30:35.377415 kernel: Failed to create system directory nfs4 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.380059 kernel: Failed to create system directory nfs4 May 15 17:30:35.380255 kernel: Failed to create system directory nfs4 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.382625 kernel: Failed to create system directory nfs4 May 15 17:30:35.382769 kernel: Failed to create system directory nfs4 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.385172 kernel: Failed to create system directory nfs4 May 15 17:30:35.385286 kernel: Failed to create system directory nfs4 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.387645 kernel: Failed to create system directory nfs4 May 15 17:30:35.387894 kernel: Failed to create system directory nfs4 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.389155 kernel: Failed to create system directory nfs4 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.394168 kernel: Failed to create system directory nfs4 May 15 17:30:35.394273 kernel: Failed to create system directory nfs4 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.397288 kernel: Failed to create system directory nfs4 May 15 17:30:35.397413 kernel: Failed to create system directory nfs4 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.399826 kernel: Failed to create system directory nfs4 May 15 17:30:35.399996 kernel: Failed to create system directory nfs4 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.401179 kernel: Failed to create system directory nfs4 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.406977 kernel: Failed to create system directory nfs4 May 15 17:30:35.407151 kernel: Failed to create system directory nfs4 May 15 17:30:35.407226 kernel: Failed to create system directory nfs4 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.409688 kernel: Failed to create system directory nfs4 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.415899 kernel: Failed to create system directory nfs4 May 15 17:30:35.416013 kernel: Failed to create system directory nfs4 May 15 17:30:35.416116 kernel: Failed to create system directory nfs4 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.417237 kernel: Failed to create system directory nfs4 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.419912 kernel: Failed to create system directory nfs4 May 15 17:30:35.420035 kernel: Failed to create system directory nfs4 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.421262 kernel: Failed to create system directory nfs4 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.424061 kernel: Failed to create system directory nfs4 May 15 17:30:35.424201 kernel: Failed to create system directory nfs4 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.425234 kernel: Failed to create system directory nfs4 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.426539 kernel: Failed to create system directory nfs4 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.427585 kernel: Failed to create system directory nfs4 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.429008 kernel: Failed to create system directory nfs4 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.430262 kernel: Failed to create system directory nfs4 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.431411 kernel: Failed to create system directory nfs4 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.433001 kernel: Failed to create system directory nfs4 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.434164 kernel: Failed to create system directory nfs4 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.435218 kernel: Failed to create system directory nfs4 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.436618 kernel: Failed to create system directory nfs4 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.441895 kernel: Failed to create system directory nfs4 May 15 17:30:35.442232 kernel: Failed to create system directory nfs4 May 15 17:30:35.442309 kernel: Failed to create system directory nfs4 May 15 17:30:35.442377 kernel: Failed to create system directory nfs4 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.443478 kernel: Failed to create system directory nfs4 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.445870 kernel: Failed to create system directory nfs4 May 15 17:30:35.446007 kernel: Failed to create system directory nfs4 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.447029 kernel: Failed to create system directory nfs4 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.449488 kernel: Failed to create system directory nfs4 May 15 17:30:35.449644 kernel: Failed to create system directory nfs4 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.451977 kernel: Failed to create system directory nfs4 May 15 17:30:35.452163 kernel: Failed to create system directory nfs4 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.454483 kernel: Failed to create system directory nfs4 May 15 17:30:35.454623 kernel: Failed to create system directory nfs4 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.456868 kernel: Failed to create system directory nfs4 May 15 17:30:35.457002 kernel: Failed to create system directory nfs4 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.459231 kernel: Failed to create system directory nfs4 May 15 17:30:35.459339 kernel: Failed to create system directory nfs4 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.460610 kernel: Failed to create system directory nfs4 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.463016 kernel: Failed to create system directory nfs4 May 15 17:30:35.463165 kernel: Failed to create system directory nfs4 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.465604 kernel: Failed to create system directory nfs4 May 15 17:30:35.465765 kernel: Failed to create system directory nfs4 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.468288 kernel: Failed to create system directory nfs4 May 15 17:30:35.468386 kernel: Failed to create system directory nfs4 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.469516 kernel: Failed to create system directory nfs4 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.472148 kernel: Failed to create system directory nfs4 May 15 17:30:35.472334 kernel: Failed to create system directory nfs4 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.473379 kernel: Failed to create system directory nfs4 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.475837 kernel: Failed to create system directory nfs4 May 15 17:30:35.475977 kernel: Failed to create system directory nfs4 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.477150 kernel: Failed to create system directory nfs4 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.479569 kernel: Failed to create system directory nfs4 May 15 17:30:35.479656 kernel: Failed to create system directory nfs4 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.482139 kernel: Failed to create system directory nfs4 May 15 17:30:35.482313 kernel: Failed to create system directory nfs4 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.484780 kernel: Failed to create system directory nfs4 May 15 17:30:35.484932 kernel: Failed to create system directory nfs4 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.337000 audit[3013]: AVC avc: denied { confidentiality } for pid=3013 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.487165 kernel: Failed to create system directory nfs4 May 15 17:30:35.658590 kernel: NFS: Registering the id_resolver key type May 15 17:30:35.658877 kernel: Key type id_resolver registered May 15 17:30:35.659014 kernel: Key type id_legacy registered May 15 17:30:35.337000 audit[3013]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f8c2410d010 a1=209404 a2=5562facd12b0 a3=5 items=0 ppid=465 pid=3013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:30:35.337000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 May 15 17:30:35.677000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.685783 kernel: Failed to create system directory rpcgss May 15 17:30:35.685865 kernel: Failed to create system directory rpcgss May 15 17:30:35.677000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.687392 kernel: Failed to create system directory rpcgss May 15 17:30:35.677000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.688899 kernel: Failed to create system directory rpcgss May 15 17:30:35.677000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.690285 kernel: Failed to create system directory rpcgss May 15 17:30:35.677000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.691812 kernel: Failed to create system directory rpcgss May 15 17:30:35.677000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.693366 kernel: Failed to create system directory rpcgss May 15 17:30:35.677000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.694853 kernel: Failed to create system directory rpcgss May 15 17:30:35.677000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.696618 kernel: Failed to create system directory rpcgss May 15 17:30:35.677000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.698212 kernel: Failed to create system directory rpcgss May 15 17:30:35.698527 kernel: Failed to create system directory rpcgss May 15 17:30:35.677000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.677000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.677000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.700925 kernel: Failed to create system directory rpcgss May 15 17:30:35.701045 kernel: Failed to create system directory rpcgss May 15 17:30:35.677000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.677000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.703532 kernel: Failed to create system directory rpcgss May 15 17:30:35.703691 kernel: Failed to create system directory rpcgss May 15 17:30:35.677000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.677000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.706176 kernel: Failed to create system directory rpcgss May 15 17:30:35.706352 kernel: Failed to create system directory rpcgss May 15 17:30:35.677000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.677000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.708752 kernel: Failed to create system directory rpcgss May 15 17:30:35.708838 kernel: Failed to create system directory rpcgss May 15 17:30:35.677000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.710050 kernel: Failed to create system directory rpcgss May 15 17:30:35.677000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.711193 kernel: Failed to create system directory rpcgss May 15 17:30:35.677000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.677000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.713775 kernel: Failed to create system directory rpcgss May 15 17:30:35.713882 kernel: Failed to create system directory rpcgss May 15 17:30:35.677000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.677000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.716389 kernel: Failed to create system directory rpcgss May 15 17:30:35.716502 kernel: Failed to create system directory rpcgss May 15 17:30:35.677000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.717664 kernel: Failed to create system directory rpcgss May 15 17:30:35.677000 audit[3014]: AVC avc: denied { confidentiality } for pid=3014 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 17:30:35.677000 audit[3014]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f1eee0c7010 a1=70b64 a2=5563555452b0 a3=5 items=0 ppid=465 pid=3014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:30:35.677000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 May 15 17:30:35.765893 kubelet[1449]: E0515 17:30:35.765750 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:35.769326 nfsidmap[3022]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'novalocal' May 15 17:30:35.777434 nfsidmap[3023]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'novalocal' May 15 17:30:35.790000 audit[1216]: AVC avc: denied { watch_reads } for pid=1216 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2564 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 15 17:30:35.791000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2564 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 15 17:30:35.791000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2564 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 15 17:30:35.791000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2564 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 15 17:30:35.790000 audit[1216]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=56223e833bc0 a2=10 a3=9ea3d5233ebe49e items=0 ppid=1 pid=1216 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:30:35.790000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 15 17:30:35.792000 audit[1216]: AVC avc: denied { watch_reads } for pid=1216 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2564 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 15 17:30:35.792000 audit[1216]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=56223e833bc0 a2=10 a3=9ea3d5233ebe49e items=0 ppid=1 pid=1216 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:30:35.792000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 15 17:30:35.793000 audit[1216]: AVC avc: denied { watch_reads } for pid=1216 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2564 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 15 17:30:35.793000 audit[1216]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=56223e833bc0 a2=10 a3=9ea3d5233ebe49e items=0 ppid=1 pid=1216 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:30:35.793000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 15 17:30:35.980227 env[1153]: time="2025-05-15T17:30:35.978365753Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:143f3699-c814-49ca-a669-a54ec940e31c,Namespace:default,Attempt:0,}" May 15 17:30:36.328887 systemd-networkd[984]: cali5ec59c6bf6e: Link UP May 15 17:30:36.336455 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 17:30:36.336998 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready May 15 17:30:36.337820 systemd-networkd[984]: cali5ec59c6bf6e: Gained carrier May 15 17:30:36.374312 env[1153]: 2025-05-15 17:30:36.144 [INFO][3024] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.218-k8s-test--pod--1-eth0 default 143f3699-c814-49ca-a669-a54ec940e31c 1559 0 2025-05-15 17:30:03 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.24.4.218 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="1a3905c49ac7b4152938e87f9b4c6203227a569e9de12696273e6033cc3049f4" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.218-k8s-test--pod--1-" May 15 17:30:36.374312 env[1153]: 2025-05-15 17:30:36.145 [INFO][3024] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="1a3905c49ac7b4152938e87f9b4c6203227a569e9de12696273e6033cc3049f4" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.218-k8s-test--pod--1-eth0" May 15 17:30:36.374312 env[1153]: 2025-05-15 17:30:36.195 [INFO][3037] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1a3905c49ac7b4152938e87f9b4c6203227a569e9de12696273e6033cc3049f4" HandleID="k8s-pod-network.1a3905c49ac7b4152938e87f9b4c6203227a569e9de12696273e6033cc3049f4" Workload="172.24.4.218-k8s-test--pod--1-eth0" May 15 17:30:36.374312 env[1153]: 2025-05-15 17:30:36.231 [INFO][3037] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="1a3905c49ac7b4152938e87f9b4c6203227a569e9de12696273e6033cc3049f4" HandleID="k8s-pod-network.1a3905c49ac7b4152938e87f9b4c6203227a569e9de12696273e6033cc3049f4" Workload="172.24.4.218-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0001fe1d0), Attrs:map[string]string{"namespace":"default", "node":"172.24.4.218", "pod":"test-pod-1", "timestamp":"2025-05-15 17:30:36.195342317 +0000 UTC"}, Hostname:"172.24.4.218", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 17:30:36.374312 env[1153]: 2025-05-15 17:30:36.231 [INFO][3037] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 17:30:36.374312 env[1153]: 2025-05-15 17:30:36.231 [INFO][3037] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 17:30:36.374312 env[1153]: 2025-05-15 17:30:36.231 [INFO][3037] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.218' May 15 17:30:36.374312 env[1153]: 2025-05-15 17:30:36.237 [INFO][3037] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.1a3905c49ac7b4152938e87f9b4c6203227a569e9de12696273e6033cc3049f4" host="172.24.4.218" May 15 17:30:36.374312 env[1153]: 2025-05-15 17:30:36.252 [INFO][3037] ipam/ipam.go 372: Looking up existing affinities for host host="172.24.4.218" May 15 17:30:36.374312 env[1153]: 2025-05-15 17:30:36.263 [INFO][3037] ipam/ipam.go 489: Trying affinity for 192.168.118.192/26 host="172.24.4.218" May 15 17:30:36.374312 env[1153]: 2025-05-15 17:30:36.267 [INFO][3037] ipam/ipam.go 155: Attempting to load block cidr=192.168.118.192/26 host="172.24.4.218" May 15 17:30:36.374312 env[1153]: 2025-05-15 17:30:36.273 [INFO][3037] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.118.192/26 host="172.24.4.218" May 15 17:30:36.374312 env[1153]: 2025-05-15 17:30:36.273 [INFO][3037] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.118.192/26 handle="k8s-pod-network.1a3905c49ac7b4152938e87f9b4c6203227a569e9de12696273e6033cc3049f4" host="172.24.4.218" May 15 17:30:36.374312 env[1153]: 2025-05-15 17:30:36.278 [INFO][3037] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.1a3905c49ac7b4152938e87f9b4c6203227a569e9de12696273e6033cc3049f4 May 15 17:30:36.374312 env[1153]: 2025-05-15 17:30:36.288 [INFO][3037] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.118.192/26 handle="k8s-pod-network.1a3905c49ac7b4152938e87f9b4c6203227a569e9de12696273e6033cc3049f4" host="172.24.4.218" May 15 17:30:36.374312 env[1153]: 2025-05-15 17:30:36.306 [INFO][3037] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.118.196/26] block=192.168.118.192/26 handle="k8s-pod-network.1a3905c49ac7b4152938e87f9b4c6203227a569e9de12696273e6033cc3049f4" host="172.24.4.218" May 15 17:30:36.374312 env[1153]: 2025-05-15 17:30:36.306 [INFO][3037] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.118.196/26] handle="k8s-pod-network.1a3905c49ac7b4152938e87f9b4c6203227a569e9de12696273e6033cc3049f4" host="172.24.4.218" May 15 17:30:36.374312 env[1153]: 2025-05-15 17:30:36.306 [INFO][3037] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 17:30:36.374312 env[1153]: 2025-05-15 17:30:36.306 [INFO][3037] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.118.196/26] IPv6=[] ContainerID="1a3905c49ac7b4152938e87f9b4c6203227a569e9de12696273e6033cc3049f4" HandleID="k8s-pod-network.1a3905c49ac7b4152938e87f9b4c6203227a569e9de12696273e6033cc3049f4" Workload="172.24.4.218-k8s-test--pod--1-eth0" May 15 17:30:36.374312 env[1153]: 2025-05-15 17:30:36.313 [INFO][3024] cni-plugin/k8s.go 386: Populated endpoint ContainerID="1a3905c49ac7b4152938e87f9b4c6203227a569e9de12696273e6033cc3049f4" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.218-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.218-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"143f3699-c814-49ca-a669-a54ec940e31c", ResourceVersion:"1559", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 17, 30, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.218", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.118.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 17:30:36.382136 env[1153]: 2025-05-15 17:30:36.314 [INFO][3024] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.118.196/32] ContainerID="1a3905c49ac7b4152938e87f9b4c6203227a569e9de12696273e6033cc3049f4" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.218-k8s-test--pod--1-eth0" May 15 17:30:36.382136 env[1153]: 2025-05-15 17:30:36.314 [INFO][3024] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="1a3905c49ac7b4152938e87f9b4c6203227a569e9de12696273e6033cc3049f4" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.218-k8s-test--pod--1-eth0" May 15 17:30:36.382136 env[1153]: 2025-05-15 17:30:36.344 [INFO][3024] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="1a3905c49ac7b4152938e87f9b4c6203227a569e9de12696273e6033cc3049f4" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.218-k8s-test--pod--1-eth0" May 15 17:30:36.382136 env[1153]: 2025-05-15 17:30:36.345 [INFO][3024] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="1a3905c49ac7b4152938e87f9b4c6203227a569e9de12696273e6033cc3049f4" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.218-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.218-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"143f3699-c814-49ca-a669-a54ec940e31c", ResourceVersion:"1559", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 17, 30, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.218", ContainerID:"1a3905c49ac7b4152938e87f9b4c6203227a569e9de12696273e6033cc3049f4", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.118.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"d2:46:0a:90:4d:f2", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 17:30:36.382136 env[1153]: 2025-05-15 17:30:36.370 [INFO][3024] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="1a3905c49ac7b4152938e87f9b4c6203227a569e9de12696273e6033cc3049f4" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.218-k8s-test--pod--1-eth0" May 15 17:30:36.409000 audit[3058]: NETFILTER_CFG table=filter:78 family=2 entries=38 op=nft_register_chain pid=3058 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 17:30:36.409000 audit[3058]: SYSCALL arch=c000003e syscall=46 success=yes exit=19400 a0=3 a1=7ffece36b2e0 a2=0 a3=7ffece36b2cc items=0 ppid=2132 pid=3058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:30:36.409000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 17:30:36.417849 env[1153]: time="2025-05-15T17:30:36.417692162Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 17:30:36.417849 env[1153]: time="2025-05-15T17:30:36.417811016Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 17:30:36.418119 env[1153]: time="2025-05-15T17:30:36.417841424Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 17:30:36.418454 env[1153]: time="2025-05-15T17:30:36.418397772Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1a3905c49ac7b4152938e87f9b4c6203227a569e9de12696273e6033cc3049f4 pid=3067 runtime=io.containerd.runc.v2 May 15 17:30:36.440278 systemd[1]: Started cri-containerd-1a3905c49ac7b4152938e87f9b4c6203227a569e9de12696273e6033cc3049f4.scope. May 15 17:30:36.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:36.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:36.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:36.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:36.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:36.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:36.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:36.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:36.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:36.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:36.477000 audit: BPF prog-id=126 op=LOAD May 15 17:30:36.479000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:36.479000 audit[3077]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3067 pid=3077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:30:36.479000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161333930356334396163376234313532393338653837663962346336 May 15 17:30:36.479000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:36.479000 audit[3077]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3067 pid=3077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:30:36.479000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161333930356334396163376234313532393338653837663962346336 May 15 17:30:36.479000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:36.479000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:36.479000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:36.479000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:36.479000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:36.479000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:36.479000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:36.479000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:36.479000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:36.479000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:36.479000 audit: BPF prog-id=127 op=LOAD May 15 17:30:36.479000 audit[3077]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0000e3e30 items=0 ppid=3067 pid=3077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:30:36.479000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161333930356334396163376234313532393338653837663962346336 May 15 17:30:36.482000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:36.482000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:36.482000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:36.482000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:36.482000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:36.482000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:36.482000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:36.482000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:36.482000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:36.482000 audit: BPF prog-id=128 op=LOAD May 15 17:30:36.482000 audit[3077]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0000e3e78 items=0 ppid=3067 pid=3077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:30:36.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161333930356334396163376234313532393338653837663962346336 May 15 17:30:36.482000 audit: BPF prog-id=128 op=UNLOAD May 15 17:30:36.482000 audit: BPF prog-id=127 op=UNLOAD May 15 17:30:36.483000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:36.483000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:36.483000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:36.483000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:36.483000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:36.483000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:36.483000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:36.483000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:36.483000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:36.483000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:36.483000 audit: BPF prog-id=129 op=LOAD May 15 17:30:36.483000 audit[3077]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003e4288 items=0 ppid=3067 pid=3077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:30:36.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161333930356334396163376234313532393338653837663962346336 May 15 17:30:36.513328 env[1153]: time="2025-05-15T17:30:36.513276593Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:143f3699-c814-49ca-a669-a54ec940e31c,Namespace:default,Attempt:0,} returns sandbox id \"1a3905c49ac7b4152938e87f9b4c6203227a569e9de12696273e6033cc3049f4\"" May 15 17:30:36.516529 env[1153]: time="2025-05-15T17:30:36.516490880Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 15 17:30:36.767035 kubelet[1449]: E0515 17:30:36.766882 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:37.036900 env[1153]: time="2025-05-15T17:30:37.036605543Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:30:37.042264 env[1153]: time="2025-05-15T17:30:37.042183655Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:30:37.047754 env[1153]: time="2025-05-15T17:30:37.047635758Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:30:37.053127 env[1153]: time="2025-05-15T17:30:37.053004675Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 17:30:37.055874 env[1153]: time="2025-05-15T17:30:37.055759477Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa\"" May 15 17:30:37.064691 env[1153]: time="2025-05-15T17:30:37.064574578Z" level=info msg="CreateContainer within sandbox \"1a3905c49ac7b4152938e87f9b4c6203227a569e9de12696273e6033cc3049f4\" for container &ContainerMetadata{Name:test,Attempt:0,}" May 15 17:30:37.111475 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1969335447.mount: Deactivated successfully. May 15 17:30:37.121340 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4244291.mount: Deactivated successfully. May 15 17:30:37.419762 systemd-networkd[984]: cali5ec59c6bf6e: Gained IPv6LL May 15 17:30:37.595036 env[1153]: time="2025-05-15T17:30:37.594928422Z" level=info msg="CreateContainer within sandbox \"1a3905c49ac7b4152938e87f9b4c6203227a569e9de12696273e6033cc3049f4\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"b39bc14df0abfd01ed8e89ec1ee1b5b0a684842ca386e39f8f536195a3e12120\"" May 15 17:30:37.597310 env[1153]: time="2025-05-15T17:30:37.597231012Z" level=info msg="StartContainer for \"b39bc14df0abfd01ed8e89ec1ee1b5b0a684842ca386e39f8f536195a3e12120\"" May 15 17:30:37.646387 systemd[1]: Started cri-containerd-b39bc14df0abfd01ed8e89ec1ee1b5b0a684842ca386e39f8f536195a3e12120.scope. May 15 17:30:37.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:37.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:37.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:37.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:37.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:37.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:37.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:37.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:37.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:37.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:37.682000 audit: BPF prog-id=130 op=LOAD May 15 17:30:37.684000 audit[3112]: AVC avc: denied { bpf } for pid=3112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:37.684000 audit[3112]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=3067 pid=3112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:30:37.684000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233396263313464663061626664303165643865383965633165653162 May 15 17:30:37.685000 audit[3112]: AVC avc: denied { perfmon } for pid=3112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:37.685000 audit[3112]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=3067 pid=3112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:30:37.685000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233396263313464663061626664303165643865383965633165653162 May 15 17:30:37.686000 audit[3112]: AVC avc: denied { bpf } for pid=3112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:37.686000 audit[3112]: AVC avc: denied { bpf } for pid=3112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:37.686000 audit[3112]: AVC avc: denied { bpf } for pid=3112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:37.686000 audit[3112]: AVC avc: denied { perfmon } for pid=3112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:37.686000 audit[3112]: AVC avc: denied { perfmon } for pid=3112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:37.686000 audit[3112]: AVC avc: denied { perfmon } for pid=3112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:37.686000 audit[3112]: AVC avc: denied { perfmon } for pid=3112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:37.686000 audit[3112]: AVC avc: denied { perfmon } for pid=3112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:37.686000 audit[3112]: AVC avc: denied { bpf } for pid=3112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:37.686000 audit[3112]: AVC avc: denied { bpf } for pid=3112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:37.686000 audit: BPF prog-id=131 op=LOAD May 15 17:30:37.686000 audit[3112]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c0002579c0 items=0 ppid=3067 pid=3112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:30:37.686000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233396263313464663061626664303165643865383965633165653162 May 15 17:30:37.688000 audit[3112]: AVC avc: denied { bpf } for pid=3112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:37.688000 audit[3112]: AVC avc: denied { bpf } for pid=3112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:37.688000 audit[3112]: AVC avc: denied { perfmon } for pid=3112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:37.688000 audit[3112]: AVC avc: denied { perfmon } for pid=3112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:37.688000 audit[3112]: AVC avc: denied { perfmon } for pid=3112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:37.688000 audit[3112]: AVC avc: denied { perfmon } for pid=3112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:37.688000 audit[3112]: AVC avc: denied { perfmon } for pid=3112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:37.688000 audit[3112]: AVC avc: denied { bpf } for pid=3112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:37.688000 audit[3112]: AVC avc: denied { bpf } for pid=3112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:37.688000 audit: BPF prog-id=132 op=LOAD May 15 17:30:37.688000 audit[3112]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c000257a08 items=0 ppid=3067 pid=3112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:30:37.688000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233396263313464663061626664303165643865383965633165653162 May 15 17:30:37.690000 audit: BPF prog-id=132 op=UNLOAD May 15 17:30:37.690000 audit: BPF prog-id=131 op=UNLOAD May 15 17:30:37.690000 audit[3112]: AVC avc: denied { bpf } for pid=3112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:37.690000 audit[3112]: AVC avc: denied { bpf } for pid=3112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:37.690000 audit[3112]: AVC avc: denied { bpf } for pid=3112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:37.690000 audit[3112]: AVC avc: denied { perfmon } for pid=3112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:37.690000 audit[3112]: AVC avc: denied { perfmon } for pid=3112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:37.690000 audit[3112]: AVC avc: denied { perfmon } for pid=3112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:37.690000 audit[3112]: AVC avc: denied { perfmon } for pid=3112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:37.690000 audit[3112]: AVC avc: denied { perfmon } for pid=3112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:37.690000 audit[3112]: AVC avc: denied { bpf } for pid=3112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:37.690000 audit[3112]: AVC avc: denied { bpf } for pid=3112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 17:30:37.690000 audit: BPF prog-id=133 op=LOAD May 15 17:30:37.690000 audit[3112]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c000257e18 items=0 ppid=3067 pid=3112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 17:30:37.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233396263313464663061626664303165643865383965633165653162 May 15 17:30:37.767764 kubelet[1449]: E0515 17:30:37.767633 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:37.793383 env[1153]: time="2025-05-15T17:30:37.793238336Z" level=info msg="StartContainer for \"b39bc14df0abfd01ed8e89ec1ee1b5b0a684842ca386e39f8f536195a3e12120\" returns successfully" May 15 17:30:38.526888 kubelet[1449]: I0515 17:30:38.526678 1449 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=34.981879399 podStartE2EDuration="35.526546016s" podCreationTimestamp="2025-05-15 17:30:03 +0000 UTC" firstStartedPulling="2025-05-15 17:30:36.515321858 +0000 UTC m=+93.720476772" lastFinishedPulling="2025-05-15 17:30:37.059988425 +0000 UTC m=+94.265143389" observedRunningTime="2025-05-15 17:30:38.526348034 +0000 UTC m=+95.731502998" watchObservedRunningTime="2025-05-15 17:30:38.526546016 +0000 UTC m=+95.731700981" May 15 17:30:38.768299 kubelet[1449]: E0515 17:30:38.768177 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:39.769575 kubelet[1449]: E0515 17:30:39.769442 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:40.769825 kubelet[1449]: E0515 17:30:40.769722 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:41.770648 kubelet[1449]: E0515 17:30:41.770520 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:42.770789 kubelet[1449]: E0515 17:30:42.770723 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:43.658136 kubelet[1449]: E0515 17:30:43.658007 1449 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:43.772900 kubelet[1449]: E0515 17:30:43.772758 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:44.773130 kubelet[1449]: E0515 17:30:44.772987 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:45.774249 kubelet[1449]: E0515 17:30:45.774164 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:46.774915 kubelet[1449]: E0515 17:30:46.774851 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:47.776386 kubelet[1449]: E0515 17:30:47.776321 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:48.778403 kubelet[1449]: E0515 17:30:48.778326 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:49.780152 kubelet[1449]: E0515 17:30:49.780031 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:50.780414 kubelet[1449]: E0515 17:30:50.780319 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:51.781299 kubelet[1449]: E0515 17:30:51.781186 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:52.782586 kubelet[1449]: E0515 17:30:52.782496 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:53.783596 kubelet[1449]: E0515 17:30:53.783529 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:54.785278 kubelet[1449]: E0515 17:30:54.785138 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:55.785986 kubelet[1449]: E0515 17:30:55.785908 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:56.787053 kubelet[1449]: E0515 17:30:56.786970 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:57.788708 kubelet[1449]: E0515 17:30:57.788669 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:58.789925 kubelet[1449]: E0515 17:30:58.789851 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:30:59.792174 kubelet[1449]: E0515 17:30:59.792050 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:00.792561 kubelet[1449]: E0515 17:31:00.792487 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:01.793952 kubelet[1449]: E0515 17:31:01.793867 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:02.796166 kubelet[1449]: E0515 17:31:02.796020 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:03.657281 kubelet[1449]: E0515 17:31:03.657213 1449 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:03.796774 kubelet[1449]: E0515 17:31:03.796627 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:04.796903 kubelet[1449]: E0515 17:31:04.796832 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:05.798417 kubelet[1449]: E0515 17:31:05.798303 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:06.800479 kubelet[1449]: E0515 17:31:06.800413 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:07.801975 kubelet[1449]: E0515 17:31:07.801898 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:08.803912 kubelet[1449]: E0515 17:31:08.803758 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:09.804680 kubelet[1449]: E0515 17:31:09.804563 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:10.804926 kubelet[1449]: E0515 17:31:10.804794 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:11.806050 kubelet[1449]: E0515 17:31:11.805980 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:12.806792 kubelet[1449]: E0515 17:31:12.806655 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:13.807299 kubelet[1449]: E0515 17:31:13.807228 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:14.808472 kubelet[1449]: E0515 17:31:14.808342 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:15.809639 kubelet[1449]: E0515 17:31:15.809565 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:16.810988 kubelet[1449]: E0515 17:31:16.810855 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:17.811851 kubelet[1449]: E0515 17:31:17.811741 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:18.812796 kubelet[1449]: E0515 17:31:18.812728 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:19.814329 kubelet[1449]: E0515 17:31:19.814239 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:20.815072 kubelet[1449]: E0515 17:31:20.814974 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:21.816073 kubelet[1449]: E0515 17:31:21.815704 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:22.817258 kubelet[1449]: E0515 17:31:22.817133 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:23.657396 kubelet[1449]: E0515 17:31:23.657315 1449 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:23.818255 kubelet[1449]: E0515 17:31:23.818188 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:24.819917 kubelet[1449]: E0515 17:31:24.819783 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:25.820762 kubelet[1449]: E0515 17:31:25.820664 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:26.821457 kubelet[1449]: E0515 17:31:26.821355 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:27.822820 kubelet[1449]: E0515 17:31:27.822594 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:28.823917 kubelet[1449]: E0515 17:31:28.823780 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:29.824600 kubelet[1449]: E0515 17:31:29.824531 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:30.825771 kubelet[1449]: E0515 17:31:30.825706 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:31.826946 kubelet[1449]: E0515 17:31:31.826808 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:32.828008 kubelet[1449]: E0515 17:31:32.827932 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:33.828997 kubelet[1449]: E0515 17:31:33.828908 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:34.830777 kubelet[1449]: E0515 17:31:34.830658 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:35.831179 kubelet[1449]: E0515 17:31:35.831116 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:36.832360 kubelet[1449]: E0515 17:31:36.832283 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:37.833300 kubelet[1449]: E0515 17:31:37.833229 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:38.834818 kubelet[1449]: E0515 17:31:38.834705 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:39.835514 kubelet[1449]: E0515 17:31:39.835447 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:40.837435 kubelet[1449]: E0515 17:31:40.837256 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:41.837522 kubelet[1449]: E0515 17:31:41.837435 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:42.838023 kubelet[1449]: E0515 17:31:42.837951 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:43.658254 kubelet[1449]: E0515 17:31:43.658176 1449 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:43.838981 kubelet[1449]: E0515 17:31:43.838917 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:44.840955 kubelet[1449]: E0515 17:31:44.840850 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:45.841776 kubelet[1449]: E0515 17:31:45.841663 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:46.842407 kubelet[1449]: E0515 17:31:46.842288 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:47.842593 kubelet[1449]: E0515 17:31:47.842481 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:48.843709 kubelet[1449]: E0515 17:31:48.843361 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:49.518131 systemd[1]: run-containerd-runc-k8s.io-6550044178d82bef888e226eca8532382f000e0fefbd32a4f065d5c814c92df2-runc.q7DDsd.mount: Deactivated successfully. May 15 17:31:49.844892 kubelet[1449]: E0515 17:31:49.844610 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:50.845927 kubelet[1449]: E0515 17:31:50.845857 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:51.846694 kubelet[1449]: E0515 17:31:51.846631 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:52.847788 kubelet[1449]: E0515 17:31:52.847401 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:53.848298 kubelet[1449]: E0515 17:31:53.848226 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:54.849526 kubelet[1449]: E0515 17:31:54.849464 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:55.850850 kubelet[1449]: E0515 17:31:55.850667 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:56.852226 kubelet[1449]: E0515 17:31:56.852046 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:57.853990 kubelet[1449]: E0515 17:31:57.853911 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:58.855332 kubelet[1449]: E0515 17:31:58.855224 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:31:59.857433 kubelet[1449]: E0515 17:31:59.857346 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:32:00.859179 kubelet[1449]: E0515 17:32:00.859049 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:32:01.860137 kubelet[1449]: E0515 17:32:01.859984 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:32:02.860935 kubelet[1449]: E0515 17:32:02.860859 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:32:03.658121 kubelet[1449]: E0515 17:32:03.658000 1449 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 17:32:03.862075 kubelet[1449]: E0515 17:32:03.861979 1449 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"