May 15 10:38:33.868948 kernel: Linux version 5.15.182-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu May 15 09:06:41 -00 2025 May 15 10:38:33.868968 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=f8c1bc5ff10765e781843bfc97fc5357002a3f8a120201a0e954fce1d2ba48f0 May 15 10:38:33.868976 kernel: BIOS-provided physical RAM map: May 15 10:38:33.868981 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable May 15 10:38:33.868987 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved May 15 10:38:33.868992 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved May 15 10:38:33.868999 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000009cfdbfff] usable May 15 10:38:33.869004 kernel: BIOS-e820: [mem 0x000000009cfdc000-0x000000009cffffff] reserved May 15 10:38:33.869011 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved May 15 10:38:33.869016 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved May 15 10:38:33.869022 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved May 15 10:38:33.869027 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved May 15 10:38:33.869033 kernel: BIOS-e820: [mem 0x000000fd00000000-0x000000ffffffffff] reserved May 15 10:38:33.869039 kernel: NX (Execute Disable) protection: active May 15 10:38:33.869047 kernel: SMBIOS 2.8 present. May 15 10:38:33.869053 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 May 15 10:38:33.869059 kernel: Hypervisor detected: KVM May 15 10:38:33.869065 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 15 10:38:33.869071 kernel: kvm-clock: cpu 0, msr 8e19a001, primary cpu clock May 15 10:38:33.869077 kernel: kvm-clock: using sched offset of 2477239443 cycles May 15 10:38:33.869084 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 15 10:38:33.869090 kernel: tsc: Detected 2794.748 MHz processor May 15 10:38:33.869096 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 15 10:38:33.869104 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 15 10:38:33.869110 kernel: last_pfn = 0x9cfdc max_arch_pfn = 0x400000000 May 15 10:38:33.869116 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 15 10:38:33.869122 kernel: Using GB pages for direct mapping May 15 10:38:33.869128 kernel: ACPI: Early table checksum verification disabled May 15 10:38:33.869136 kernel: ACPI: RSDP 0x00000000000F59D0 000014 (v00 BOCHS ) May 15 10:38:33.869143 kernel: ACPI: RSDT 0x000000009CFE2408 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:38:33.869151 kernel: ACPI: FACP 0x000000009CFE21E8 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:38:33.869159 kernel: ACPI: DSDT 0x000000009CFE0040 0021A8 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:38:33.869168 kernel: ACPI: FACS 0x000000009CFE0000 000040 May 15 10:38:33.869177 kernel: ACPI: APIC 0x000000009CFE22DC 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:38:33.869185 kernel: ACPI: HPET 0x000000009CFE236C 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:38:33.869193 kernel: ACPI: MCFG 0x000000009CFE23A4 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:38:33.869201 kernel: ACPI: WAET 0x000000009CFE23E0 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:38:33.869209 kernel: ACPI: Reserving FACP table memory at [mem 0x9cfe21e8-0x9cfe22db] May 15 10:38:33.869217 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cfe0040-0x9cfe21e7] May 15 10:38:33.869225 kernel: ACPI: Reserving FACS table memory at [mem 0x9cfe0000-0x9cfe003f] May 15 10:38:33.869238 kernel: ACPI: Reserving APIC table memory at [mem 0x9cfe22dc-0x9cfe236b] May 15 10:38:33.869246 kernel: ACPI: Reserving HPET table memory at [mem 0x9cfe236c-0x9cfe23a3] May 15 10:38:33.869254 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cfe23a4-0x9cfe23df] May 15 10:38:33.869262 kernel: ACPI: Reserving WAET table memory at [mem 0x9cfe23e0-0x9cfe2407] May 15 10:38:33.869270 kernel: No NUMA configuration found May 15 10:38:33.869279 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cfdbfff] May 15 10:38:33.869288 kernel: NODE_DATA(0) allocated [mem 0x9cfd6000-0x9cfdbfff] May 15 10:38:33.869296 kernel: Zone ranges: May 15 10:38:33.869304 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 15 10:38:33.869312 kernel: DMA32 [mem 0x0000000001000000-0x000000009cfdbfff] May 15 10:38:33.869319 kernel: Normal empty May 15 10:38:33.869327 kernel: Movable zone start for each node May 15 10:38:33.869335 kernel: Early memory node ranges May 15 10:38:33.869342 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] May 15 10:38:33.869350 kernel: node 0: [mem 0x0000000000100000-0x000000009cfdbfff] May 15 10:38:33.869359 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cfdbfff] May 15 10:38:33.869367 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 15 10:38:33.869375 kernel: On node 0, zone DMA: 97 pages in unavailable ranges May 15 10:38:33.869383 kernel: On node 0, zone DMA32: 12324 pages in unavailable ranges May 15 10:38:33.869391 kernel: ACPI: PM-Timer IO Port: 0x608 May 15 10:38:33.869399 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 15 10:38:33.869408 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 May 15 10:38:33.869416 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) May 15 10:38:33.869424 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 15 10:38:33.869432 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 15 10:38:33.869442 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 15 10:38:33.869450 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 15 10:38:33.869458 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 15 10:38:33.869467 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 May 15 10:38:33.869475 kernel: TSC deadline timer available May 15 10:38:33.869484 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs May 15 10:38:33.869492 kernel: kvm-guest: KVM setup pv remote TLB flush May 15 10:38:33.869500 kernel: kvm-guest: setup PV sched yield May 15 10:38:33.869509 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices May 15 10:38:33.869518 kernel: Booting paravirtualized kernel on KVM May 15 10:38:33.869527 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 15 10:38:33.869536 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 May 15 10:38:33.869545 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 May 15 10:38:33.869554 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 May 15 10:38:33.869562 kernel: pcpu-alloc: [0] 0 1 2 3 May 15 10:38:33.869570 kernel: kvm-guest: setup async PF for cpu 0 May 15 10:38:33.869579 kernel: kvm-guest: stealtime: cpu 0, msr 9a41c0c0 May 15 10:38:33.869587 kernel: kvm-guest: PV spinlocks enabled May 15 10:38:33.869598 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) May 15 10:38:33.869606 kernel: Built 1 zonelists, mobility grouping on. Total pages: 632732 May 15 10:38:33.869615 kernel: Policy zone: DMA32 May 15 10:38:33.869624 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=f8c1bc5ff10765e781843bfc97fc5357002a3f8a120201a0e954fce1d2ba48f0 May 15 10:38:33.869632 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 15 10:38:33.869641 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 15 10:38:33.869649 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 15 10:38:33.869656 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 15 10:38:33.869664 kernel: Memory: 2436696K/2571752K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47472K init, 4108K bss, 134796K reserved, 0K cma-reserved) May 15 10:38:33.869671 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 May 15 10:38:33.869677 kernel: ftrace: allocating 34585 entries in 136 pages May 15 10:38:33.869684 kernel: ftrace: allocated 136 pages with 2 groups May 15 10:38:33.869691 kernel: rcu: Hierarchical RCU implementation. May 15 10:38:33.869698 kernel: rcu: RCU event tracing is enabled. May 15 10:38:33.869705 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. May 15 10:38:33.869711 kernel: Rude variant of Tasks RCU enabled. May 15 10:38:33.869718 kernel: Tracing variant of Tasks RCU enabled. May 15 10:38:33.869726 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 15 10:38:33.869744 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 May 15 10:38:33.869750 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 May 15 10:38:33.869757 kernel: random: crng init done May 15 10:38:33.869763 kernel: Console: colour VGA+ 80x25 May 15 10:38:33.869770 kernel: printk: console [ttyS0] enabled May 15 10:38:33.869776 kernel: ACPI: Core revision 20210730 May 15 10:38:33.869783 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns May 15 10:38:33.869790 kernel: APIC: Switch to symmetric I/O mode setup May 15 10:38:33.869797 kernel: x2apic enabled May 15 10:38:33.869804 kernel: Switched APIC routing to physical x2apic. May 15 10:38:33.869847 kernel: kvm-guest: setup PV IPIs May 15 10:38:33.869855 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 15 10:38:33.869862 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized May 15 10:38:33.869868 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) May 15 10:38:33.869875 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated May 15 10:38:33.869882 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 May 15 10:38:33.869889 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 May 15 10:38:33.869901 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 15 10:38:33.869908 kernel: Spectre V2 : Mitigation: Retpolines May 15 10:38:33.869915 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 15 10:38:33.869923 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls May 15 10:38:33.869930 kernel: RETBleed: Mitigation: untrained return thunk May 15 10:38:33.869937 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier May 15 10:38:33.869944 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp May 15 10:38:33.869951 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 15 10:38:33.869958 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 15 10:38:33.869966 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 15 10:38:33.869973 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 15 10:38:33.869980 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. May 15 10:38:33.869987 kernel: Freeing SMP alternatives memory: 32K May 15 10:38:33.869994 kernel: pid_max: default: 32768 minimum: 301 May 15 10:38:33.870001 kernel: LSM: Security Framework initializing May 15 10:38:33.870008 kernel: SELinux: Initializing. May 15 10:38:33.870015 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 15 10:38:33.870023 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 15 10:38:33.870030 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) May 15 10:38:33.870037 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. May 15 10:38:33.870044 kernel: ... version: 0 May 15 10:38:33.870051 kernel: ... bit width: 48 May 15 10:38:33.870058 kernel: ... generic registers: 6 May 15 10:38:33.870065 kernel: ... value mask: 0000ffffffffffff May 15 10:38:33.870072 kernel: ... max period: 00007fffffffffff May 15 10:38:33.870078 kernel: ... fixed-purpose events: 0 May 15 10:38:33.870087 kernel: ... event mask: 000000000000003f May 15 10:38:33.870093 kernel: signal: max sigframe size: 1776 May 15 10:38:33.870100 kernel: rcu: Hierarchical SRCU implementation. May 15 10:38:33.870107 kernel: smp: Bringing up secondary CPUs ... May 15 10:38:33.870114 kernel: x86: Booting SMP configuration: May 15 10:38:33.870121 kernel: .... node #0, CPUs: #1 May 15 10:38:33.870128 kernel: kvm-clock: cpu 1, msr 8e19a041, secondary cpu clock May 15 10:38:33.870135 kernel: kvm-guest: setup async PF for cpu 1 May 15 10:38:33.870141 kernel: kvm-guest: stealtime: cpu 1, msr 9a49c0c0 May 15 10:38:33.870170 kernel: #2 May 15 10:38:33.870183 kernel: kvm-clock: cpu 2, msr 8e19a081, secondary cpu clock May 15 10:38:33.870190 kernel: kvm-guest: setup async PF for cpu 2 May 15 10:38:33.870196 kernel: kvm-guest: stealtime: cpu 2, msr 9a51c0c0 May 15 10:38:33.870203 kernel: #3 May 15 10:38:33.870210 kernel: kvm-clock: cpu 3, msr 8e19a0c1, secondary cpu clock May 15 10:38:33.870217 kernel: kvm-guest: setup async PF for cpu 3 May 15 10:38:33.870224 kernel: kvm-guest: stealtime: cpu 3, msr 9a59c0c0 May 15 10:38:33.870231 kernel: smp: Brought up 1 node, 4 CPUs May 15 10:38:33.870240 kernel: smpboot: Max logical packages: 1 May 15 10:38:33.870247 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) May 15 10:38:33.870254 kernel: devtmpfs: initialized May 15 10:38:33.870260 kernel: x86/mm: Memory block size: 128MB May 15 10:38:33.870267 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 15 10:38:33.870275 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) May 15 10:38:33.870281 kernel: pinctrl core: initialized pinctrl subsystem May 15 10:38:33.870288 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 15 10:38:33.870295 kernel: audit: initializing netlink subsys (disabled) May 15 10:38:33.870303 kernel: audit: type=2000 audit(1747305512.896:1): state=initialized audit_enabled=0 res=1 May 15 10:38:33.870310 kernel: thermal_sys: Registered thermal governor 'step_wise' May 15 10:38:33.870317 kernel: thermal_sys: Registered thermal governor 'user_space' May 15 10:38:33.870324 kernel: cpuidle: using governor menu May 15 10:38:33.870331 kernel: ACPI: bus type PCI registered May 15 10:38:33.870338 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 15 10:38:33.870344 kernel: dca service started, version 1.12.1 May 15 10:38:33.870351 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) May 15 10:38:33.870358 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 May 15 10:38:33.870367 kernel: PCI: Using configuration type 1 for base access May 15 10:38:33.870374 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 15 10:38:33.870381 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 15 10:38:33.870388 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 15 10:38:33.870394 kernel: ACPI: Added _OSI(Module Device) May 15 10:38:33.870401 kernel: ACPI: Added _OSI(Processor Device) May 15 10:38:33.870408 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 15 10:38:33.870415 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 15 10:38:33.870422 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 15 10:38:33.870434 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 15 10:38:33.870441 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 15 10:38:33.870448 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 15 10:38:33.870455 kernel: ACPI: Interpreter enabled May 15 10:38:33.870462 kernel: ACPI: PM: (supports S0 S3 S5) May 15 10:38:33.870469 kernel: ACPI: Using IOAPIC for interrupt routing May 15 10:38:33.870476 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 15 10:38:33.870483 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F May 15 10:38:33.870490 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 15 10:38:33.870617 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 15 10:38:33.870718 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] May 15 10:38:33.870856 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] May 15 10:38:33.870874 kernel: PCI host bridge to bus 0000:00 May 15 10:38:33.870962 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 15 10:38:33.871039 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 15 10:38:33.871119 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 15 10:38:33.871205 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] May 15 10:38:33.871273 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] May 15 10:38:33.871332 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x8ffffffff window] May 15 10:38:33.871392 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 15 10:38:33.871471 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 May 15 10:38:33.871546 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 May 15 10:38:33.871617 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfd000000-0xfdffffff pref] May 15 10:38:33.871685 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xfebd0000-0xfebd0fff] May 15 10:38:33.871777 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfebc0000-0xfebcffff pref] May 15 10:38:33.871859 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 15 10:38:33.871940 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 May 15 10:38:33.872011 kernel: pci 0000:00:02.0: reg 0x10: [io 0xc0c0-0xc0df] May 15 10:38:33.872082 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xfebd1000-0xfebd1fff] May 15 10:38:33.872152 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfe000000-0xfe003fff 64bit pref] May 15 10:38:33.872226 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 May 15 10:38:33.872299 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc000-0xc07f] May 15 10:38:33.872394 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebd2000-0xfebd2fff] May 15 10:38:33.872478 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe004000-0xfe007fff 64bit pref] May 15 10:38:33.872571 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 May 15 10:38:33.872662 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc0e0-0xc0ff] May 15 10:38:33.872769 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebd3000-0xfebd3fff] May 15 10:38:33.872853 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe008000-0xfe00bfff 64bit pref] May 15 10:38:33.872942 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfeb80000-0xfebbffff pref] May 15 10:38:33.873018 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 May 15 10:38:33.873102 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO May 15 10:38:33.873194 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 May 15 10:38:33.873264 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xc100-0xc11f] May 15 10:38:33.873335 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfebd4000-0xfebd4fff] May 15 10:38:33.873423 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 May 15 10:38:33.873492 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] May 15 10:38:33.873501 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 15 10:38:33.873520 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 15 10:38:33.873528 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 15 10:38:33.873535 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 15 10:38:33.873544 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 May 15 10:38:33.873552 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 May 15 10:38:33.873559 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 May 15 10:38:33.873566 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 May 15 10:38:33.873580 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 May 15 10:38:33.873590 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 May 15 10:38:33.873597 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 May 15 10:38:33.873604 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 May 15 10:38:33.873611 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 May 15 10:38:33.873620 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 May 15 10:38:33.873627 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 May 15 10:38:33.873645 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 May 15 10:38:33.873655 kernel: iommu: Default domain type: Translated May 15 10:38:33.873664 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 15 10:38:33.873799 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device May 15 10:38:33.873959 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 15 10:38:33.874074 kernel: pci 0000:00:01.0: vgaarb: bridge control possible May 15 10:38:33.874089 kernel: vgaarb: loaded May 15 10:38:33.874116 kernel: pps_core: LinuxPPS API ver. 1 registered May 15 10:38:33.874126 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 15 10:38:33.874136 kernel: PTP clock support registered May 15 10:38:33.874145 kernel: PCI: Using ACPI for IRQ routing May 15 10:38:33.874155 kernel: PCI: pci_cache_line_size set to 64 bytes May 15 10:38:33.874165 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] May 15 10:38:33.874175 kernel: e820: reserve RAM buffer [mem 0x9cfdc000-0x9fffffff] May 15 10:38:33.874184 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 May 15 10:38:33.874206 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter May 15 10:38:33.874218 kernel: clocksource: Switched to clocksource kvm-clock May 15 10:38:33.874228 kernel: VFS: Disk quotas dquot_6.6.0 May 15 10:38:33.874238 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 15 10:38:33.874248 kernel: pnp: PnP ACPI init May 15 10:38:33.874366 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved May 15 10:38:33.874394 kernel: pnp: PnP ACPI: found 6 devices May 15 10:38:33.874405 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 15 10:38:33.874415 kernel: NET: Registered PF_INET protocol family May 15 10:38:33.874427 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 15 10:38:33.874437 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 15 10:38:33.874447 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 15 10:38:33.874468 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 15 10:38:33.874479 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 15 10:38:33.874489 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 15 10:38:33.874499 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 15 10:38:33.874509 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 15 10:38:33.874532 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 15 10:38:33.874542 kernel: NET: Registered PF_XDP protocol family May 15 10:38:33.874658 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 15 10:38:33.874859 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 15 10:38:33.874980 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 15 10:38:33.875097 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] May 15 10:38:33.875213 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] May 15 10:38:33.875342 kernel: pci_bus 0000:00: resource 9 [mem 0x100000000-0x8ffffffff window] May 15 10:38:33.875358 kernel: PCI: CLS 0 bytes, default 64 May 15 10:38:33.875371 kernel: Initialise system trusted keyrings May 15 10:38:33.875381 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 15 10:38:33.875391 kernel: Key type asymmetric registered May 15 10:38:33.875401 kernel: Asymmetric key parser 'x509' registered May 15 10:38:33.875411 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 15 10:38:33.875421 kernel: io scheduler mq-deadline registered May 15 10:38:33.875430 kernel: io scheduler kyber registered May 15 10:38:33.875440 kernel: io scheduler bfq registered May 15 10:38:33.875450 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 15 10:38:33.875463 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 May 15 10:38:33.875473 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 May 15 10:38:33.875482 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 May 15 10:38:33.875492 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 15 10:38:33.875503 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 15 10:38:33.875513 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 15 10:38:33.875523 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 15 10:38:33.875532 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 15 10:38:33.875638 kernel: rtc_cmos 00:04: RTC can wake from S4 May 15 10:38:33.875656 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 15 10:38:33.875757 kernel: rtc_cmos 00:04: registered as rtc0 May 15 10:38:33.875893 kernel: rtc_cmos 00:04: setting system clock to 2025-05-15T10:38:33 UTC (1747305513) May 15 10:38:33.875981 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs May 15 10:38:33.875995 kernel: NET: Registered PF_INET6 protocol family May 15 10:38:33.876006 kernel: Segment Routing with IPv6 May 15 10:38:33.876015 kernel: In-situ OAM (IOAM) with IPv6 May 15 10:38:33.876025 kernel: NET: Registered PF_PACKET protocol family May 15 10:38:33.876038 kernel: Key type dns_resolver registered May 15 10:38:33.876048 kernel: IPI shorthand broadcast: enabled May 15 10:38:33.876058 kernel: sched_clock: Marking stable (407202289, 102457764)->(552660373, -43000320) May 15 10:38:33.876068 kernel: registered taskstats version 1 May 15 10:38:33.876078 kernel: Loading compiled-in X.509 certificates May 15 10:38:33.876087 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.182-flatcar: 04007c306af6b7696d09b3c2eafc1297036fd28e' May 15 10:38:33.876097 kernel: Key type .fscrypt registered May 15 10:38:33.876107 kernel: Key type fscrypt-provisioning registered May 15 10:38:33.876116 kernel: ima: No TPM chip found, activating TPM-bypass! May 15 10:38:33.876127 kernel: ima: Allocated hash algorithm: sha1 May 15 10:38:33.876137 kernel: ima: No architecture policies found May 15 10:38:33.876146 kernel: clk: Disabling unused clocks May 15 10:38:33.876155 kernel: Freeing unused kernel image (initmem) memory: 47472K May 15 10:38:33.876165 kernel: Write protecting the kernel read-only data: 28672k May 15 10:38:33.876174 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 15 10:38:33.876184 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 15 10:38:33.876192 kernel: Run /init as init process May 15 10:38:33.876202 kernel: with arguments: May 15 10:38:33.876213 kernel: /init May 15 10:38:33.876223 kernel: with environment: May 15 10:38:33.876232 kernel: HOME=/ May 15 10:38:33.876242 kernel: TERM=linux May 15 10:38:33.876252 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 15 10:38:33.876264 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 15 10:38:33.876277 systemd[1]: Detected virtualization kvm. May 15 10:38:33.876289 systemd[1]: Detected architecture x86-64. May 15 10:38:33.876299 systemd[1]: Running in initrd. May 15 10:38:33.876309 systemd[1]: No hostname configured, using default hostname. May 15 10:38:33.876320 systemd[1]: Hostname set to . May 15 10:38:33.876330 systemd[1]: Initializing machine ID from VM UUID. May 15 10:38:33.876341 systemd[1]: Queued start job for default target initrd.target. May 15 10:38:33.876351 systemd[1]: Started systemd-ask-password-console.path. May 15 10:38:33.876361 systemd[1]: Reached target cryptsetup.target. May 15 10:38:33.876370 systemd[1]: Reached target paths.target. May 15 10:38:33.876383 systemd[1]: Reached target slices.target. May 15 10:38:33.876401 systemd[1]: Reached target swap.target. May 15 10:38:33.876413 systemd[1]: Reached target timers.target. May 15 10:38:33.876424 systemd[1]: Listening on iscsid.socket. May 15 10:38:33.876434 systemd[1]: Listening on iscsiuio.socket. May 15 10:38:33.876446 systemd[1]: Listening on systemd-journald-audit.socket. May 15 10:38:33.876457 systemd[1]: Listening on systemd-journald-dev-log.socket. May 15 10:38:33.876467 systemd[1]: Listening on systemd-journald.socket. May 15 10:38:33.876478 systemd[1]: Listening on systemd-networkd.socket. May 15 10:38:33.876488 systemd[1]: Listening on systemd-udevd-control.socket. May 15 10:38:33.876498 systemd[1]: Listening on systemd-udevd-kernel.socket. May 15 10:38:33.876509 systemd[1]: Reached target sockets.target. May 15 10:38:33.876519 systemd[1]: Starting kmod-static-nodes.service... May 15 10:38:33.876529 systemd[1]: Finished network-cleanup.service. May 15 10:38:33.876541 systemd[1]: Starting systemd-fsck-usr.service... May 15 10:38:33.876552 systemd[1]: Starting systemd-journald.service... May 15 10:38:33.876563 systemd[1]: Starting systemd-modules-load.service... May 15 10:38:33.876573 systemd[1]: Starting systemd-resolved.service... May 15 10:38:33.876583 systemd[1]: Starting systemd-vconsole-setup.service... May 15 10:38:33.876594 systemd[1]: Finished kmod-static-nodes.service. May 15 10:38:33.876605 systemd[1]: Finished systemd-fsck-usr.service. May 15 10:38:33.876615 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 15 10:38:33.876628 systemd-journald[197]: Journal started May 15 10:38:33.876680 systemd-journald[197]: Runtime Journal (/run/log/journal/71c11124a1234dcf8d80ea8fff88d785) is 6.0M, max 48.5M, 42.5M free. May 15 10:38:33.866680 systemd-modules-load[198]: Inserted module 'overlay' May 15 10:38:33.917297 systemd[1]: Started systemd-journald.service. May 15 10:38:33.917319 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 15 10:38:33.917331 kernel: Bridge firewalling registered May 15 10:38:33.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.881944 systemd-resolved[199]: Positive Trust Anchors: May 15 10:38:33.881953 systemd-resolved[199]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 15 10:38:33.923864 kernel: audit: type=1130 audit(1747305513.916:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.923883 kernel: audit: type=1130 audit(1747305513.920:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.881980 systemd-resolved[199]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 15 10:38:33.884051 systemd-resolved[199]: Defaulting to hostname 'linux'. May 15 10:38:33.941632 kernel: audit: type=1130 audit(1747305513.926:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.941652 kernel: SCSI subsystem initialized May 15 10:38:33.941661 kernel: audit: type=1130 audit(1747305513.933:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.926000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.905464 systemd-modules-load[198]: Inserted module 'br_netfilter' May 15 10:38:33.919989 systemd[1]: Started systemd-resolved.service. May 15 10:38:33.921252 systemd[1]: Finished systemd-vconsole-setup.service. May 15 10:38:33.928014 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 15 10:38:33.934472 systemd[1]: Reached target nss-lookup.target. May 15 10:38:33.943774 systemd[1]: Starting dracut-cmdline-ask.service... May 15 10:38:33.956984 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 15 10:38:33.957056 kernel: device-mapper: uevent: version 1.0.3 May 15 10:38:33.957067 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 15 10:38:33.959481 systemd[1]: Finished dracut-cmdline-ask.service. May 15 10:38:33.958000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.960493 systemd[1]: Starting dracut-cmdline.service... May 15 10:38:33.966080 kernel: audit: type=1130 audit(1747305513.958:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.966105 systemd-modules-load[198]: Inserted module 'dm_multipath' May 15 10:38:33.966836 systemd[1]: Finished systemd-modules-load.service. May 15 10:38:33.968129 systemd[1]: Starting systemd-sysctl.service... May 15 10:38:33.966000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.973834 kernel: audit: type=1130 audit(1747305513.966:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.974320 systemd[1]: Finished systemd-sysctl.service. May 15 10:38:33.973000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.978846 kernel: audit: type=1130 audit(1747305513.973:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.980900 dracut-cmdline[216]: dracut-dracut-053 May 15 10:38:33.982641 dracut-cmdline[216]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=f8c1bc5ff10765e781843bfc97fc5357002a3f8a120201a0e954fce1d2ba48f0 May 15 10:38:34.033843 kernel: Loading iSCSI transport class v2.0-870. May 15 10:38:34.049863 kernel: iscsi: registered transport (tcp) May 15 10:38:34.071105 kernel: iscsi: registered transport (qla4xxx) May 15 10:38:34.071155 kernel: QLogic iSCSI HBA Driver May 15 10:38:34.091349 systemd[1]: Finished dracut-cmdline.service. May 15 10:38:34.096532 kernel: audit: type=1130 audit(1747305514.091:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:34.091000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:34.093008 systemd[1]: Starting dracut-pre-udev.service... May 15 10:38:34.136847 kernel: raid6: avx2x4 gen() 30079 MB/s May 15 10:38:34.153847 kernel: raid6: avx2x4 xor() 7393 MB/s May 15 10:38:34.170838 kernel: raid6: avx2x2 gen() 31110 MB/s May 15 10:38:34.187835 kernel: raid6: avx2x2 xor() 19161 MB/s May 15 10:38:34.204839 kernel: raid6: avx2x1 gen() 26217 MB/s May 15 10:38:34.221836 kernel: raid6: avx2x1 xor() 15220 MB/s May 15 10:38:34.238835 kernel: raid6: sse2x4 gen() 14676 MB/s May 15 10:38:34.255834 kernel: raid6: sse2x4 xor() 6881 MB/s May 15 10:38:34.272849 kernel: raid6: sse2x2 gen() 16079 MB/s May 15 10:38:34.289865 kernel: raid6: sse2x2 xor() 9728 MB/s May 15 10:38:34.306855 kernel: raid6: sse2x1 gen() 12208 MB/s May 15 10:38:34.324233 kernel: raid6: sse2x1 xor() 7799 MB/s May 15 10:38:34.324301 kernel: raid6: using algorithm avx2x2 gen() 31110 MB/s May 15 10:38:34.324311 kernel: raid6: .... xor() 19161 MB/s, rmw enabled May 15 10:38:34.324946 kernel: raid6: using avx2x2 recovery algorithm May 15 10:38:34.336859 kernel: xor: automatically using best checksumming function avx May 15 10:38:34.424856 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 15 10:38:34.430985 systemd[1]: Finished dracut-pre-udev.service. May 15 10:38:34.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:34.434000 audit: BPF prog-id=7 op=LOAD May 15 10:38:34.434000 audit: BPF prog-id=8 op=LOAD May 15 10:38:34.435701 systemd[1]: Starting systemd-udevd.service... May 15 10:38:34.437168 kernel: audit: type=1130 audit(1747305514.431:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:34.447268 systemd-udevd[402]: Using default interface naming scheme 'v252'. May 15 10:38:34.450924 systemd[1]: Started systemd-udevd.service. May 15 10:38:34.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:34.452836 systemd[1]: Starting dracut-pre-trigger.service... May 15 10:38:34.463894 dracut-pre-trigger[409]: rd.md=0: removing MD RAID activation May 15 10:38:34.482980 systemd[1]: Finished dracut-pre-trigger.service. May 15 10:38:34.482000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:34.484563 systemd[1]: Starting systemd-udev-trigger.service... May 15 10:38:34.515838 systemd[1]: Finished systemd-udev-trigger.service. May 15 10:38:34.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:34.540831 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) May 15 10:38:34.546241 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 15 10:38:34.546253 kernel: GPT:9289727 != 19775487 May 15 10:38:34.546261 kernel: GPT:Alternate GPT header not at the end of the disk. May 15 10:38:34.546270 kernel: GPT:9289727 != 19775487 May 15 10:38:34.546279 kernel: GPT: Use GNU Parted to correct GPT errors. May 15 10:38:34.546289 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 10:38:34.547830 kernel: cryptd: max_cpu_qlen set to 1000 May 15 10:38:34.559027 kernel: AVX2 version of gcm_enc/dec engaged. May 15 10:38:34.559059 kernel: libata version 3.00 loaded. May 15 10:38:34.559069 kernel: AES CTR mode by8 optimization enabled May 15 10:38:34.575839 kernel: ahci 0000:00:1f.2: version 3.0 May 15 10:38:34.578405 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 May 15 10:38:34.578421 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode May 15 10:38:34.578512 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only May 15 10:38:34.578584 kernel: scsi host0: ahci May 15 10:38:34.578672 kernel: scsi host1: ahci May 15 10:38:34.578760 kernel: scsi host2: ahci May 15 10:38:34.578891 kernel: scsi host3: ahci May 15 10:38:34.579002 kernel: scsi host4: ahci May 15 10:38:34.579101 kernel: scsi host5: ahci May 15 10:38:34.579178 kernel: ata1: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4100 irq 34 May 15 10:38:34.579187 kernel: ata2: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4180 irq 34 May 15 10:38:34.579199 kernel: ata3: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4200 irq 34 May 15 10:38:34.579208 kernel: ata4: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4280 irq 34 May 15 10:38:34.579216 kernel: ata5: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4300 irq 34 May 15 10:38:34.579225 kernel: ata6: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4380 irq 34 May 15 10:38:34.581251 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 15 10:38:34.629772 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (446) May 15 10:38:34.631712 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 15 10:38:34.635085 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 15 10:38:34.638332 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 15 10:38:34.643925 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 15 10:38:34.645657 systemd[1]: Starting disk-uuid.service... May 15 10:38:34.655555 disk-uuid[526]: Primary Header is updated. May 15 10:38:34.655555 disk-uuid[526]: Secondary Entries is updated. May 15 10:38:34.655555 disk-uuid[526]: Secondary Header is updated. May 15 10:38:34.659835 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 10:38:34.662829 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 10:38:34.883852 kernel: ata1: SATA link down (SStatus 0 SControl 300) May 15 10:38:34.892595 kernel: ata5: SATA link down (SStatus 0 SControl 300) May 15 10:38:34.892625 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) May 15 10:38:34.893684 kernel: ata4: SATA link down (SStatus 0 SControl 300) May 15 10:38:34.893834 kernel: ata2: SATA link down (SStatus 0 SControl 300) May 15 10:38:34.894841 kernel: ata6: SATA link down (SStatus 0 SControl 300) May 15 10:38:34.895838 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 May 15 10:38:34.896995 kernel: ata3.00: applying bridge limits May 15 10:38:34.897047 kernel: ata3.00: configured for UDMA/100 May 15 10:38:34.900957 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 May 15 10:38:34.931960 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray May 15 10:38:34.949384 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 May 15 10:38:34.949400 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 May 15 10:38:35.663838 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 10:38:35.663977 disk-uuid[527]: The operation has completed successfully. May 15 10:38:35.684040 systemd[1]: disk-uuid.service: Deactivated successfully. May 15 10:38:35.684000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:35.684000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:35.684113 systemd[1]: Finished disk-uuid.service. May 15 10:38:35.690646 systemd[1]: Starting verity-setup.service... May 15 10:38:35.701837 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" May 15 10:38:35.717975 systemd[1]: Found device dev-mapper-usr.device. May 15 10:38:35.719804 systemd[1]: Mounting sysusr-usr.mount... May 15 10:38:35.721295 systemd[1]: Finished verity-setup.service. May 15 10:38:35.720000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:35.777831 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 15 10:38:35.778116 systemd[1]: Mounted sysusr-usr.mount. May 15 10:38:35.778648 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 15 10:38:35.779516 systemd[1]: Starting ignition-setup.service... May 15 10:38:35.781993 systemd[1]: Starting parse-ip-for-networkd.service... May 15 10:38:35.792237 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 15 10:38:35.792268 kernel: BTRFS info (device vda6): using free space tree May 15 10:38:35.792282 kernel: BTRFS info (device vda6): has skinny extents May 15 10:38:35.799500 systemd[1]: mnt-oem.mount: Deactivated successfully. May 15 10:38:35.807542 systemd[1]: Finished ignition-setup.service. May 15 10:38:35.807000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:35.808777 systemd[1]: Starting ignition-fetch-offline.service... May 15 10:38:35.839828 systemd[1]: Finished parse-ip-for-networkd.service. May 15 10:38:35.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:35.840000 audit: BPF prog-id=9 op=LOAD May 15 10:38:35.842190 systemd[1]: Starting systemd-networkd.service... May 15 10:38:35.847021 ignition[653]: Ignition 2.14.0 May 15 10:38:35.847029 ignition[653]: Stage: fetch-offline May 15 10:38:35.847095 ignition[653]: no configs at "/usr/lib/ignition/base.d" May 15 10:38:35.847103 ignition[653]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:38:35.847182 ignition[653]: parsed url from cmdline: "" May 15 10:38:35.847185 ignition[653]: no config URL provided May 15 10:38:35.847189 ignition[653]: reading system config file "/usr/lib/ignition/user.ign" May 15 10:38:35.847194 ignition[653]: no config at "/usr/lib/ignition/user.ign" May 15 10:38:35.847208 ignition[653]: op(1): [started] loading QEMU firmware config module May 15 10:38:35.847213 ignition[653]: op(1): executing: "modprobe" "qemu_fw_cfg" May 15 10:38:35.849665 ignition[653]: op(1): [finished] loading QEMU firmware config module May 15 10:38:35.849677 ignition[653]: QEMU firmware config was not found. Ignoring... May 15 10:38:35.857554 unknown[653]: fetched base config from "system" May 15 10:38:35.851125 ignition[653]: parsing config with SHA512: 82f2d98a5a3c18fa7fb026bf22fa2b60a3f8a0974619413f28ad203f8d3ea588cfb45bcba8564688fd3cfb530dc1a4acb90c496b770dde5d1c366b0702d96a60 May 15 10:38:35.857561 unknown[653]: fetched user config from "qemu" May 15 10:38:35.857948 ignition[653]: fetch-offline: fetch-offline passed May 15 10:38:35.861000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:35.860898 systemd[1]: Finished ignition-fetch-offline.service. May 15 10:38:35.858004 ignition[653]: Ignition finished successfully May 15 10:38:35.872115 systemd-networkd[716]: lo: Link UP May 15 10:38:35.872123 systemd-networkd[716]: lo: Gained carrier May 15 10:38:35.873000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:35.872526 systemd-networkd[716]: Enumeration completed May 15 10:38:35.872587 systemd[1]: Started systemd-networkd.service. May 15 10:38:35.872768 systemd-networkd[716]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 15 10:38:35.873846 systemd-networkd[716]: eth0: Link UP May 15 10:38:35.873850 systemd-networkd[716]: eth0: Gained carrier May 15 10:38:35.874358 systemd[1]: Reached target network.target. May 15 10:38:35.881000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:35.875787 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 15 10:38:35.886338 iscsid[724]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 15 10:38:35.886338 iscsid[724]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log May 15 10:38:35.886338 iscsid[724]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 15 10:38:35.886338 iscsid[724]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 15 10:38:35.886338 iscsid[724]: If using hardware iscsi like qla4xxx this message can be ignored. May 15 10:38:35.886338 iscsid[724]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 15 10:38:35.886338 iscsid[724]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 15 10:38:35.888000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:35.893000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:35.876562 systemd[1]: Starting ignition-kargs.service... May 15 10:38:35.888346 ignition[720]: Ignition 2.14.0 May 15 10:38:35.878026 systemd[1]: Starting iscsiuio.service... May 15 10:38:35.888351 ignition[720]: Stage: kargs May 15 10:38:35.881330 systemd[1]: Started iscsiuio.service. May 15 10:38:35.888426 ignition[720]: no configs at "/usr/lib/ignition/base.d" May 15 10:38:35.882979 systemd[1]: Starting iscsid.service... May 15 10:38:35.888434 ignition[720]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:38:35.887345 systemd[1]: Started iscsid.service. May 15 10:38:35.909000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:35.889059 ignition[720]: kargs: kargs passed May 15 10:38:35.889518 systemd[1]: Starting dracut-initqueue.service... May 15 10:38:35.889086 ignition[720]: Ignition finished successfully May 15 10:38:35.893258 systemd-networkd[716]: eth0: DHCPv4 address 10.0.0.55/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 15 10:38:35.908396 ignition[738]: Ignition 2.14.0 May 15 10:38:35.893592 systemd[1]: Finished ignition-kargs.service. May 15 10:38:35.914000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:35.908400 ignition[738]: Stage: disks May 15 10:38:35.903066 systemd[1]: Starting ignition-disks.service... May 15 10:38:35.908476 ignition[738]: no configs at "/usr/lib/ignition/base.d" May 15 10:38:35.907530 systemd[1]: Finished dracut-initqueue.service. May 15 10:38:35.908483 ignition[738]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:38:35.914203 systemd[1]: Finished ignition-disks.service. May 15 10:38:35.909168 ignition[738]: disks: disks passed May 15 10:38:35.916825 systemd[1]: Reached target initrd-root-device.target. May 15 10:38:35.909194 ignition[738]: Ignition finished successfully May 15 10:38:35.918486 systemd[1]: Reached target local-fs-pre.target. May 15 10:38:35.924943 systemd[1]: Reached target local-fs.target. May 15 10:38:35.926387 systemd[1]: Reached target remote-fs-pre.target. May 15 10:38:35.927960 systemd[1]: Reached target remote-cryptsetup.target. May 15 10:38:35.929586 systemd[1]: Reached target remote-fs.target. May 15 10:38:35.931091 systemd[1]: Reached target sysinit.target. May 15 10:38:35.932497 systemd[1]: Reached target basic.target. May 15 10:38:35.934599 systemd[1]: Starting dracut-pre-mount.service... May 15 10:38:35.941167 systemd[1]: Finished dracut-pre-mount.service. May 15 10:38:35.941000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:35.943240 systemd[1]: Starting systemd-fsck-root.service... May 15 10:38:35.951052 systemd-resolved[199]: Detected conflict on linux IN A 10.0.0.55 May 15 10:38:35.951063 systemd-resolved[199]: Hostname conflict, changing published hostname from 'linux' to 'linux10'. May 15 10:38:35.987405 systemd-fsck[752]: ROOT: clean, 623/553520 files, 56023/553472 blocks May 15 10:38:36.003575 systemd[1]: Finished systemd-fsck-root.service. May 15 10:38:36.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:36.006163 systemd[1]: Mounting sysroot.mount... May 15 10:38:36.012843 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 15 10:38:36.013256 systemd[1]: Mounted sysroot.mount. May 15 10:38:36.014224 systemd[1]: Reached target initrd-root-fs.target. May 15 10:38:36.016660 systemd[1]: Mounting sysroot-usr.mount... May 15 10:38:36.018070 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 15 10:38:36.018106 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 15 10:38:36.018129 systemd[1]: Reached target ignition-diskful.target. May 15 10:38:36.020328 systemd[1]: Mounted sysroot-usr.mount. May 15 10:38:36.026944 initrd-setup-root[762]: cut: /sysroot/etc/passwd: No such file or directory May 15 10:38:36.022647 systemd[1]: Starting initrd-setup-root.service... May 15 10:38:36.029362 initrd-setup-root[770]: cut: /sysroot/etc/group: No such file or directory May 15 10:38:36.031454 initrd-setup-root[778]: cut: /sysroot/etc/shadow: No such file or directory May 15 10:38:36.034610 initrd-setup-root[786]: cut: /sysroot/etc/gshadow: No such file or directory May 15 10:38:36.056304 systemd[1]: Finished initrd-setup-root.service. May 15 10:38:36.056000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:36.058077 systemd[1]: Starting ignition-mount.service... May 15 10:38:36.059472 systemd[1]: Starting sysroot-boot.service... May 15 10:38:36.061839 bash[803]: umount: /sysroot/usr/share/oem: not mounted. May 15 10:38:36.068375 ignition[804]: INFO : Ignition 2.14.0 May 15 10:38:36.068375 ignition[804]: INFO : Stage: mount May 15 10:38:36.070203 ignition[804]: INFO : no configs at "/usr/lib/ignition/base.d" May 15 10:38:36.070203 ignition[804]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:38:36.073228 ignition[804]: INFO : mount: mount passed May 15 10:38:36.074046 ignition[804]: INFO : Ignition finished successfully May 15 10:38:36.075579 systemd[1]: Finished ignition-mount.service. May 15 10:38:36.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:36.078093 systemd[1]: Finished sysroot-boot.service. May 15 10:38:36.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:36.730030 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 15 10:38:36.740124 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (813) May 15 10:38:36.740185 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 15 10:38:36.740196 kernel: BTRFS info (device vda6): using free space tree May 15 10:38:36.741137 kernel: BTRFS info (device vda6): has skinny extents May 15 10:38:36.745957 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 15 10:38:36.747900 systemd[1]: Starting ignition-files.service... May 15 10:38:36.762039 ignition[833]: INFO : Ignition 2.14.0 May 15 10:38:36.762039 ignition[833]: INFO : Stage: files May 15 10:38:36.764095 ignition[833]: INFO : no configs at "/usr/lib/ignition/base.d" May 15 10:38:36.764095 ignition[833]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:38:36.764095 ignition[833]: DEBUG : files: compiled without relabeling support, skipping May 15 10:38:36.764095 ignition[833]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 15 10:38:36.764095 ignition[833]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 15 10:38:36.772134 ignition[833]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 15 10:38:36.772134 ignition[833]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 15 10:38:36.772134 ignition[833]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 15 10:38:36.772134 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" May 15 10:38:36.772134 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" May 15 10:38:36.772134 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" May 15 10:38:36.772134 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 15 10:38:36.772134 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 15 10:38:36.772134 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 15 10:38:36.772134 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 15 10:38:36.772134 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-x86-64.raw: attempt #1 May 15 10:38:36.766404 unknown[833]: wrote ssh authorized keys file for user: core May 15 10:38:37.228283 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK May 15 10:38:37.773955 systemd-networkd[716]: eth0: Gained IPv6LL May 15 10:38:38.253249 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 15 10:38:38.253249 ignition[833]: INFO : files: op(7): [started] processing unit "coreos-metadata.service" May 15 10:38:38.258115 ignition[833]: INFO : files: op(7): op(8): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 15 10:38:38.258115 ignition[833]: INFO : files: op(7): op(8): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 15 10:38:38.258115 ignition[833]: INFO : files: op(7): [finished] processing unit "coreos-metadata.service" May 15 10:38:38.258115 ignition[833]: INFO : files: op(9): [started] setting preset to disabled for "coreos-metadata.service" May 15 10:38:38.258115 ignition[833]: INFO : files: op(9): op(a): [started] removing enablement symlink(s) for "coreos-metadata.service" May 15 10:38:38.286792 ignition[833]: INFO : files: op(9): op(a): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 15 10:38:38.288904 ignition[833]: INFO : files: op(9): [finished] setting preset to disabled for "coreos-metadata.service" May 15 10:38:38.288904 ignition[833]: INFO : files: createResultFile: createFiles: op(b): [started] writing file "/sysroot/etc/.ignition-result.json" May 15 10:38:38.288904 ignition[833]: INFO : files: createResultFile: createFiles: op(b): [finished] writing file "/sysroot/etc/.ignition-result.json" May 15 10:38:38.288904 ignition[833]: INFO : files: files passed May 15 10:38:38.288904 ignition[833]: INFO : Ignition finished successfully May 15 10:38:38.296097 systemd[1]: Finished ignition-files.service. May 15 10:38:38.301719 kernel: kauditd_printk_skb: 23 callbacks suppressed May 15 10:38:38.301740 kernel: audit: type=1130 audit(1747305518.295:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:38.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:38.301764 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 15 10:38:38.302230 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 15 10:38:38.302885 systemd[1]: Starting ignition-quench.service... May 15 10:38:38.315499 kernel: audit: type=1130 audit(1747305518.305:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:38.315541 kernel: audit: type=1131 audit(1747305518.305:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:38.315555 kernel: audit: type=1130 audit(1747305518.314:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:38.305000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:38.305000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:38.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:38.305543 systemd[1]: ignition-quench.service: Deactivated successfully. May 15 10:38:38.305662 systemd[1]: Finished ignition-quench.service. May 15 10:38:38.322521 initrd-setup-root-after-ignition[858]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory May 15 10:38:38.312506 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 15 10:38:38.325216 initrd-setup-root-after-ignition[860]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 15 10:38:38.315534 systemd[1]: Reached target ignition-complete.target. May 15 10:38:38.320298 systemd[1]: Starting initrd-parse-etc.service... May 15 10:38:38.331775 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 15 10:38:38.331887 systemd[1]: Finished initrd-parse-etc.service. May 15 10:38:38.342239 kernel: audit: type=1130 audit(1747305518.332:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:38.342266 kernel: audit: type=1131 audit(1747305518.332:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:38.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:38.332000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:38.333874 systemd[1]: Reached target initrd-fs.target. May 15 10:38:38.341187 systemd[1]: Reached target initrd.target. May 15 10:38:38.341396 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 15 10:38:38.342254 systemd[1]: Starting dracut-pre-pivot.service... May 15 10:38:38.351117 systemd[1]: Finished dracut-pre-pivot.service. May 15 10:38:38.356862 kernel: audit: type=1130 audit(1747305518.351:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:38.351000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:38.352865 systemd[1]: Starting initrd-cleanup.service... May 15 10:38:38.361573 systemd[1]: Stopped target nss-lookup.target. May 15 10:38:38.362558 systemd[1]: Stopped target remote-cryptsetup.target. May 15 10:38:38.364418 systemd[1]: Stopped target timers.target. May 15 10:38:38.365922 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 15 10:38:38.372355 kernel: audit: type=1131 audit(1747305518.366:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:38.366000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:38.366041 systemd[1]: Stopped dracut-pre-pivot.service. May 15 10:38:38.367513 systemd[1]: Stopped target initrd.target. May 15 10:38:38.372462 systemd[1]: Stopped target basic.target. May 15 10:38:38.374179 systemd[1]: Stopped target ignition-complete.target. May 15 10:38:38.375774 systemd[1]: Stopped target ignition-diskful.target. May 15 10:38:38.377309 systemd[1]: Stopped target initrd-root-device.target. May 15 10:38:38.379004 systemd[1]: Stopped target remote-fs.target. May 15 10:38:38.380582 systemd[1]: Stopped target remote-fs-pre.target. May 15 10:38:38.382274 systemd[1]: Stopped target sysinit.target. May 15 10:38:38.383768 systemd[1]: Stopped target local-fs.target. May 15 10:38:38.385278 systemd[1]: Stopped target local-fs-pre.target. May 15 10:38:38.386775 systemd[1]: Stopped target swap.target. May 15 10:38:38.393978 kernel: audit: type=1131 audit(1747305518.388:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:38.388000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:38.388170 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 15 10:38:38.388281 systemd[1]: Stopped dracut-pre-mount.service. May 15 10:38:38.400157 kernel: audit: type=1131 audit(1747305518.394:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:38.394000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:38.389838 systemd[1]: Stopped target cryptsetup.target. May 15 10:38:38.399000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:38.394020 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 15 10:38:38.394106 systemd[1]: Stopped dracut-initqueue.service. May 15 10:38:38.395862 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 15 10:38:38.395949 systemd[1]: Stopped ignition-fetch-offline.service. May 15 10:38:38.400282 systemd[1]: Stopped target paths.target. May 15 10:38:38.401704 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 15 10:38:38.404867 systemd[1]: Stopped systemd-ask-password-console.path. May 15 10:38:38.406127 systemd[1]: Stopped target slices.target. May 15 10:38:38.407527 systemd[1]: Stopped target sockets.target. May 15 10:38:38.409310 systemd[1]: iscsid.socket: Deactivated successfully. May 15 10:38:38.413000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:38.409380 systemd[1]: Closed iscsid.socket. May 15 10:38:38.415000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:38.410798 systemd[1]: iscsiuio.socket: Deactivated successfully. May 15 10:38:38.410873 systemd[1]: Closed iscsiuio.socket. May 15 10:38:38.412169 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 15 10:38:38.418000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:38.412263 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 15 10:38:38.413858 systemd[1]: ignition-files.service: Deactivated successfully. May 15 10:38:38.423000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:38.425020 ignition[873]: INFO : Ignition 2.14.0 May 15 10:38:38.425020 ignition[873]: INFO : Stage: umount May 15 10:38:38.425020 ignition[873]: INFO : no configs at "/usr/lib/ignition/base.d" May 15 10:38:38.425020 ignition[873]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:38:38.425020 ignition[873]: INFO : umount: umount passed May 15 10:38:38.425020 ignition[873]: INFO : Ignition finished successfully May 15 10:38:38.424000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:38.428000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:38.430000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:38.430000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:38.433000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:38.434000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:38.436000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:38.413935 systemd[1]: Stopped ignition-files.service. May 15 10:38:38.416354 systemd[1]: Stopping ignition-mount.service... May 15 10:38:38.417858 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 15 10:38:38.417954 systemd[1]: Stopped kmod-static-nodes.service. May 15 10:38:38.420125 systemd[1]: Stopping sysroot-boot.service... May 15 10:38:38.421228 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 15 10:38:38.442000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:38.421356 systemd[1]: Stopped systemd-udev-trigger.service. May 15 10:38:38.423252 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 15 10:38:38.423361 systemd[1]: Stopped dracut-pre-trigger.service. May 15 10:38:38.426857 systemd[1]: ignition-mount.service: Deactivated successfully. May 15 10:38:38.448000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:38.450000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:38.426924 systemd[1]: Stopped ignition-mount.service. May 15 10:38:38.451000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:38.455000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:38.429548 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 15 10:38:38.429613 systemd[1]: Finished initrd-cleanup.service. May 15 10:38:38.431319 systemd[1]: Stopped target network.target. May 15 10:38:38.432225 systemd[1]: ignition-disks.service: Deactivated successfully. May 15 10:38:38.459000 audit: BPF prog-id=6 op=UNLOAD May 15 10:38:38.432258 systemd[1]: Stopped ignition-disks.service. May 15 10:38:38.461000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:38.434049 systemd[1]: ignition-kargs.service: Deactivated successfully. May 15 10:38:38.434077 systemd[1]: Stopped ignition-kargs.service. May 15 10:38:38.434992 systemd[1]: ignition-setup.service: Deactivated successfully. May 15 10:38:38.435019 systemd[1]: Stopped ignition-setup.service. May 15 10:38:38.463000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:38.436176 systemd[1]: Stopping systemd-networkd.service... May 15 10:38:38.437778 systemd[1]: Stopping systemd-resolved.service... May 15 10:38:38.439297 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 15 10:38:38.440121 systemd-networkd[716]: eth0: DHCPv6 lease lost May 15 10:38:38.470000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:38.470000 audit: BPF prog-id=9 op=UNLOAD May 15 10:38:38.471000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:38.441344 systemd[1]: systemd-networkd.service: Deactivated successfully. May 15 10:38:38.471000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:38.441420 systemd[1]: Stopped systemd-networkd.service. May 15 10:38:38.474000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:38.444658 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 15 10:38:38.444683 systemd[1]: Closed systemd-networkd.socket. May 15 10:38:38.446532 systemd[1]: Stopping network-cleanup.service... May 15 10:38:38.478000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:38.478000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:38.447992 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 15 10:38:38.448030 systemd[1]: Stopped parse-ip-for-networkd.service. May 15 10:38:38.449806 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 15 10:38:38.449853 systemd[1]: Stopped systemd-sysctl.service. May 15 10:38:38.451795 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 15 10:38:38.451836 systemd[1]: Stopped systemd-modules-load.service. May 15 10:38:38.452321 systemd[1]: Stopping systemd-udevd.service... May 15 10:38:38.453206 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 15 10:38:38.453559 systemd[1]: systemd-resolved.service: Deactivated successfully. May 15 10:38:38.453642 systemd[1]: Stopped systemd-resolved.service. May 15 10:38:38.459714 systemd[1]: network-cleanup.service: Deactivated successfully. May 15 10:38:38.459777 systemd[1]: Stopped network-cleanup.service. May 15 10:38:38.463260 systemd[1]: systemd-udevd.service: Deactivated successfully. May 15 10:38:38.463360 systemd[1]: Stopped systemd-udevd.service. May 15 10:38:38.465694 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 15 10:38:38.465729 systemd[1]: Closed systemd-udevd-control.socket. May 15 10:38:38.467210 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 15 10:38:38.467235 systemd[1]: Closed systemd-udevd-kernel.socket. May 15 10:38:38.468792 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 15 10:38:38.468835 systemd[1]: Stopped dracut-pre-udev.service. May 15 10:38:38.470449 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 15 10:38:38.470477 systemd[1]: Stopped dracut-cmdline.service. May 15 10:38:38.472003 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 15 10:38:38.472034 systemd[1]: Stopped dracut-cmdline-ask.service. May 15 10:38:38.472976 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 15 10:38:38.474512 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 15 10:38:38.474548 systemd[1]: Stopped systemd-vconsole-setup.service. May 15 10:38:38.477583 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 15 10:38:38.477653 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 15 10:38:38.548998 systemd[1]: sysroot-boot.service: Deactivated successfully. May 15 10:38:38.549094 systemd[1]: Stopped sysroot-boot.service. May 15 10:38:38.549000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:38.550933 systemd[1]: Reached target initrd-switch-root.target. May 15 10:38:38.552000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:38.552338 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 15 10:38:38.552373 systemd[1]: Stopped initrd-setup-root.service. May 15 10:38:38.553857 systemd[1]: Starting initrd-switch-root.service... May 15 10:38:38.570414 systemd[1]: Switching root. May 15 10:38:38.588794 iscsid[724]: iscsid shutting down. May 15 10:38:38.589521 systemd-journald[197]: Received SIGTERM from PID 1 (systemd). May 15 10:38:38.589559 systemd-journald[197]: Journal stopped May 15 10:38:41.481123 kernel: SELinux: Class mctp_socket not defined in policy. May 15 10:38:41.481169 kernel: SELinux: Class anon_inode not defined in policy. May 15 10:38:41.481186 kernel: SELinux: the above unknown classes and permissions will be allowed May 15 10:38:41.481200 kernel: SELinux: policy capability network_peer_controls=1 May 15 10:38:41.481214 kernel: SELinux: policy capability open_perms=1 May 15 10:38:41.481228 kernel: SELinux: policy capability extended_socket_class=1 May 15 10:38:41.481240 kernel: SELinux: policy capability always_check_network=0 May 15 10:38:41.481252 kernel: SELinux: policy capability cgroup_seclabel=1 May 15 10:38:41.481264 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 15 10:38:41.481280 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 15 10:38:41.481292 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 15 10:38:41.481304 systemd[1]: Successfully loaded SELinux policy in 42.624ms. May 15 10:38:41.481318 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.661ms. May 15 10:38:41.481330 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 15 10:38:41.481342 systemd[1]: Detected virtualization kvm. May 15 10:38:41.481354 systemd[1]: Detected architecture x86-64. May 15 10:38:41.481365 systemd[1]: Detected first boot. May 15 10:38:41.481377 systemd[1]: Initializing machine ID from VM UUID. May 15 10:38:41.481390 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 15 10:38:41.481401 systemd[1]: Populated /etc with preset unit settings. May 15 10:38:41.481413 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 10:38:41.481425 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 10:38:41.481438 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 10:38:41.481451 systemd[1]: iscsiuio.service: Deactivated successfully. May 15 10:38:41.481462 systemd[1]: Stopped iscsiuio.service. May 15 10:38:41.481474 systemd[1]: iscsid.service: Deactivated successfully. May 15 10:38:41.481486 systemd[1]: Stopped iscsid.service. May 15 10:38:41.481498 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 15 10:38:41.481509 systemd[1]: Stopped initrd-switch-root.service. May 15 10:38:41.481520 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 15 10:38:41.481532 systemd[1]: Created slice system-addon\x2dconfig.slice. May 15 10:38:41.481544 systemd[1]: Created slice system-addon\x2drun.slice. May 15 10:38:41.481555 systemd[1]: Created slice system-getty.slice. May 15 10:38:41.481576 systemd[1]: Created slice system-modprobe.slice. May 15 10:38:41.481588 systemd[1]: Created slice system-serial\x2dgetty.slice. May 15 10:38:41.481601 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 15 10:38:41.481615 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 15 10:38:41.481627 systemd[1]: Created slice user.slice. May 15 10:38:41.481638 systemd[1]: Started systemd-ask-password-console.path. May 15 10:38:41.481650 systemd[1]: Started systemd-ask-password-wall.path. May 15 10:38:41.481662 systemd[1]: Set up automount boot.automount. May 15 10:38:41.481673 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 15 10:38:41.481686 systemd[1]: Stopped target initrd-switch-root.target. May 15 10:38:41.481699 systemd[1]: Stopped target initrd-fs.target. May 15 10:38:41.481710 systemd[1]: Stopped target initrd-root-fs.target. May 15 10:38:41.481722 systemd[1]: Reached target integritysetup.target. May 15 10:38:41.481733 systemd[1]: Reached target remote-cryptsetup.target. May 15 10:38:41.481745 systemd[1]: Reached target remote-fs.target. May 15 10:38:41.481758 systemd[1]: Reached target slices.target. May 15 10:38:41.481769 systemd[1]: Reached target swap.target. May 15 10:38:41.481781 systemd[1]: Reached target torcx.target. May 15 10:38:41.481792 systemd[1]: Reached target veritysetup.target. May 15 10:38:41.481804 systemd[1]: Listening on systemd-coredump.socket. May 15 10:38:41.481844 systemd[1]: Listening on systemd-initctl.socket. May 15 10:38:41.481856 systemd[1]: Listening on systemd-networkd.socket. May 15 10:38:41.481867 systemd[1]: Listening on systemd-udevd-control.socket. May 15 10:38:41.481879 systemd[1]: Listening on systemd-udevd-kernel.socket. May 15 10:38:41.481890 systemd[1]: Listening on systemd-userdbd.socket. May 15 10:38:41.481904 systemd[1]: Mounting dev-hugepages.mount... May 15 10:38:41.481915 systemd[1]: Mounting dev-mqueue.mount... May 15 10:38:41.481927 systemd[1]: Mounting media.mount... May 15 10:38:41.481938 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:38:41.481950 systemd[1]: Mounting sys-kernel-debug.mount... May 15 10:38:41.481962 systemd[1]: Mounting sys-kernel-tracing.mount... May 15 10:38:41.481973 systemd[1]: Mounting tmp.mount... May 15 10:38:41.481984 systemd[1]: Starting flatcar-tmpfiles.service... May 15 10:38:41.481996 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 10:38:41.482009 systemd[1]: Starting kmod-static-nodes.service... May 15 10:38:41.482020 systemd[1]: Starting modprobe@configfs.service... May 15 10:38:41.482032 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:38:41.482043 systemd[1]: Starting modprobe@drm.service... May 15 10:38:41.482054 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:38:41.482066 systemd[1]: Starting modprobe@fuse.service... May 15 10:38:41.482077 systemd[1]: Starting modprobe@loop.service... May 15 10:38:41.482089 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 15 10:38:41.482101 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 15 10:38:41.482113 systemd[1]: Stopped systemd-fsck-root.service. May 15 10:38:41.482125 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 15 10:38:41.482137 systemd[1]: Stopped systemd-fsck-usr.service. May 15 10:38:41.482148 kernel: fuse: init (API version 7.34) May 15 10:38:41.482159 kernel: loop: module loaded May 15 10:38:41.482170 systemd[1]: Stopped systemd-journald.service. May 15 10:38:41.482182 systemd[1]: Starting systemd-journald.service... May 15 10:38:41.482193 systemd[1]: Starting systemd-modules-load.service... May 15 10:38:41.482204 systemd[1]: Starting systemd-network-generator.service... May 15 10:38:41.482218 systemd[1]: Starting systemd-remount-fs.service... May 15 10:38:41.482229 systemd[1]: Starting systemd-udev-trigger.service... May 15 10:38:41.482241 systemd[1]: verity-setup.service: Deactivated successfully. May 15 10:38:41.482252 systemd[1]: Stopped verity-setup.service. May 15 10:38:41.482264 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:38:41.482276 systemd[1]: Mounted dev-hugepages.mount. May 15 10:38:41.482287 systemd[1]: Mounted dev-mqueue.mount. May 15 10:38:41.482300 systemd-journald[991]: Journal started May 15 10:38:41.482339 systemd-journald[991]: Runtime Journal (/run/log/journal/71c11124a1234dcf8d80ea8fff88d785) is 6.0M, max 48.5M, 42.5M free. May 15 10:38:38.650000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 15 10:38:38.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 15 10:38:38.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 15 10:38:38.809000 audit: BPF prog-id=10 op=LOAD May 15 10:38:38.809000 audit: BPF prog-id=10 op=UNLOAD May 15 10:38:38.809000 audit: BPF prog-id=11 op=LOAD May 15 10:38:38.809000 audit: BPF prog-id=11 op=UNLOAD May 15 10:38:38.845000 audit[906]: AVC avc: denied { associate } for pid=906 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 15 10:38:38.845000 audit[906]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001878d2 a1=c00002ae40 a2=c000029080 a3=32 items=0 ppid=889 pid=906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:38.845000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 15 10:38:38.846000 audit[906]: AVC avc: denied { associate } for pid=906 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 15 10:38:38.846000 audit[906]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001879a9 a2=1ed a3=0 items=2 ppid=889 pid=906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:38.846000 audit: CWD cwd="/" May 15 10:38:38.846000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:38.846000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:38.846000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 15 10:38:41.336000 audit: BPF prog-id=12 op=LOAD May 15 10:38:41.336000 audit: BPF prog-id=3 op=UNLOAD May 15 10:38:41.336000 audit: BPF prog-id=13 op=LOAD May 15 10:38:41.336000 audit: BPF prog-id=14 op=LOAD May 15 10:38:41.336000 audit: BPF prog-id=4 op=UNLOAD May 15 10:38:41.336000 audit: BPF prog-id=5 op=UNLOAD May 15 10:38:41.337000 audit: BPF prog-id=15 op=LOAD May 15 10:38:41.337000 audit: BPF prog-id=12 op=UNLOAD May 15 10:38:41.337000 audit: BPF prog-id=16 op=LOAD May 15 10:38:41.337000 audit: BPF prog-id=17 op=LOAD May 15 10:38:41.337000 audit: BPF prog-id=13 op=UNLOAD May 15 10:38:41.337000 audit: BPF prog-id=14 op=UNLOAD May 15 10:38:41.338000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:41.341000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:41.344000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:41.347000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:41.347000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:41.352000 audit: BPF prog-id=15 op=UNLOAD May 15 10:38:41.451000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:41.455000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:41.456000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:41.456000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:41.457000 audit: BPF prog-id=18 op=LOAD May 15 10:38:41.457000 audit: BPF prog-id=19 op=LOAD May 15 10:38:41.457000 audit: BPF prog-id=20 op=LOAD May 15 10:38:41.457000 audit: BPF prog-id=16 op=UNLOAD May 15 10:38:41.457000 audit: BPF prog-id=17 op=UNLOAD May 15 10:38:41.476000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:41.479000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 15 10:38:41.479000 audit[991]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffe9f91ed60 a2=4000 a3=7ffe9f91edfc items=0 ppid=1 pid=991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:41.479000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 15 10:38:41.335611 systemd[1]: Queued start job for default target multi-user.target. May 15 10:38:38.838769 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-05-15T10:38:38Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 10:38:41.335622 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 15 10:38:38.844756 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-05-15T10:38:38Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 15 10:38:41.339214 systemd[1]: systemd-journald.service: Deactivated successfully. May 15 10:38:38.844782 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-05-15T10:38:38Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 15 10:38:38.844838 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-05-15T10:38:38Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 15 10:38:38.844851 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-05-15T10:38:38Z" level=debug msg="skipped missing lower profile" missing profile=oem May 15 10:38:38.844899 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-05-15T10:38:38Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 15 10:38:38.844918 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-05-15T10:38:38Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 15 10:38:38.845177 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-05-15T10:38:38Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 15 10:38:38.845223 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-05-15T10:38:38Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 15 10:38:38.845239 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-05-15T10:38:38Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 15 10:38:38.845690 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-05-15T10:38:38Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 15 10:38:38.845722 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-05-15T10:38:38Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 15 10:38:38.845737 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-05-15T10:38:38Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.100: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.100 May 15 10:38:38.845750 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-05-15T10:38:38Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 15 10:38:38.845764 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-05-15T10:38:38Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.100: no such file or directory" path=/var/lib/torcx/store/3510.3.100 May 15 10:38:41.484876 systemd[1]: Started systemd-journald.service. May 15 10:38:38.845776 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-05-15T10:38:38Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 15 10:38:41.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:41.074317 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-05-15T10:38:41Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 10:38:41.074555 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-05-15T10:38:41Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 10:38:41.074659 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-05-15T10:38:41Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 10:38:41.074805 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-05-15T10:38:41Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 10:38:41.074878 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-05-15T10:38:41Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 15 10:38:41.074930 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-05-15T10:38:41Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 15 10:38:41.485317 systemd[1]: Mounted media.mount. May 15 10:38:41.486131 systemd[1]: Mounted sys-kernel-debug.mount. May 15 10:38:41.487017 systemd[1]: Mounted sys-kernel-tracing.mount. May 15 10:38:41.487923 systemd[1]: Mounted tmp.mount. May 15 10:38:41.488799 systemd[1]: Finished flatcar-tmpfiles.service. May 15 10:38:41.489000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:41.490230 systemd[1]: Finished kmod-static-nodes.service. May 15 10:38:41.491000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:41.491267 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 15 10:38:41.491389 systemd[1]: Finished modprobe@configfs.service. May 15 10:38:41.492000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:41.492000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:41.492475 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:38:41.492641 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:38:41.492000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:41.492000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:41.493676 systemd[1]: modprobe@drm.service: Deactivated successfully. May 15 10:38:41.493800 systemd[1]: Finished modprobe@drm.service. May 15 10:38:41.493000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:41.493000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:41.494864 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:38:41.494982 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:38:41.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:41.495000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:41.496213 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 15 10:38:41.496335 systemd[1]: Finished modprobe@fuse.service. May 15 10:38:41.497000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:41.497000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:41.497354 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:38:41.497468 systemd[1]: Finished modprobe@loop.service. May 15 10:38:41.498000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:41.498000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:41.498515 systemd[1]: Finished systemd-modules-load.service. May 15 10:38:41.499000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:41.500207 systemd[1]: Finished systemd-network-generator.service. May 15 10:38:41.501000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:41.501395 systemd[1]: Finished systemd-remount-fs.service. May 15 10:38:41.502000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:41.502781 systemd[1]: Reached target network-pre.target. May 15 10:38:41.504652 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 15 10:38:41.506728 systemd[1]: Mounting sys-kernel-config.mount... May 15 10:38:41.507658 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 15 10:38:41.509700 systemd[1]: Starting systemd-hwdb-update.service... May 15 10:38:41.511747 systemd[1]: Starting systemd-journal-flush.service... May 15 10:38:41.513124 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 10:38:41.515945 systemd-journald[991]: Time spent on flushing to /var/log/journal/71c11124a1234dcf8d80ea8fff88d785 is 17.319ms for 1078 entries. May 15 10:38:41.515945 systemd-journald[991]: System Journal (/var/log/journal/71c11124a1234dcf8d80ea8fff88d785) is 8.0M, max 195.6M, 187.6M free. May 15 10:38:41.550921 systemd-journald[991]: Received client request to flush runtime journal. May 15 10:38:41.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:41.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:41.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:41.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:41.515032 systemd[1]: Starting systemd-random-seed.service... May 15 10:38:41.517392 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 10:38:41.518314 systemd[1]: Starting systemd-sysctl.service... May 15 10:38:41.520360 systemd[1]: Starting systemd-sysusers.service... May 15 10:38:41.551938 udevadm[1011]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. May 15 10:38:41.523188 systemd[1]: Finished systemd-udev-trigger.service. May 15 10:38:41.524330 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 15 10:38:41.525653 systemd[1]: Mounted sys-kernel-config.mount. May 15 10:38:41.526693 systemd[1]: Finished systemd-random-seed.service. May 15 10:38:41.527739 systemd[1]: Reached target first-boot-complete.target. May 15 10:38:41.529703 systemd[1]: Starting systemd-udev-settle.service... May 15 10:38:41.530707 systemd[1]: Finished systemd-sysctl.service. May 15 10:38:41.543625 systemd[1]: Finished systemd-sysusers.service. May 15 10:38:41.551493 systemd[1]: Finished systemd-journal-flush.service. May 15 10:38:41.552000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:42.053749 systemd[1]: Finished systemd-hwdb-update.service. May 15 10:38:42.053000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:42.054000 audit: BPF prog-id=21 op=LOAD May 15 10:38:42.054000 audit: BPF prog-id=22 op=LOAD May 15 10:38:42.054000 audit: BPF prog-id=7 op=UNLOAD May 15 10:38:42.054000 audit: BPF prog-id=8 op=UNLOAD May 15 10:38:42.056337 systemd[1]: Starting systemd-udevd.service... May 15 10:38:42.071151 systemd-udevd[1013]: Using default interface naming scheme 'v252'. May 15 10:38:42.084153 systemd[1]: Started systemd-udevd.service. May 15 10:38:42.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:42.085000 audit: BPF prog-id=23 op=LOAD May 15 10:38:42.087868 systemd[1]: Starting systemd-networkd.service... May 15 10:38:42.091000 audit: BPF prog-id=24 op=LOAD May 15 10:38:42.091000 audit: BPF prog-id=25 op=LOAD May 15 10:38:42.091000 audit: BPF prog-id=26 op=LOAD May 15 10:38:42.093154 systemd[1]: Starting systemd-userdbd.service... May 15 10:38:42.118492 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 15 10:38:42.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:42.123352 systemd[1]: Started systemd-userdbd.service. May 15 10:38:42.144367 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 15 10:38:42.159847 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 15 10:38:42.164839 kernel: ACPI: button: Power Button [PWRF] May 15 10:38:42.170537 systemd-networkd[1020]: lo: Link UP May 15 10:38:42.170754 systemd-networkd[1020]: lo: Gained carrier May 15 10:38:42.171229 systemd-networkd[1020]: Enumeration completed May 15 10:38:42.171363 systemd[1]: Started systemd-networkd.service. May 15 10:38:42.172013 systemd-networkd[1020]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 15 10:38:42.171000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:42.173223 systemd-networkd[1020]: eth0: Link UP May 15 10:38:42.173228 systemd-networkd[1020]: eth0: Gained carrier May 15 10:38:42.181938 systemd-networkd[1020]: eth0: DHCPv4 address 10.0.0.55/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 15 10:38:42.178000 audit[1039]: AVC avc: denied { confidentiality } for pid=1039 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 15 10:38:42.178000 audit[1039]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55f9f27e2e90 a1=338ac a2=7f1556869bc5 a3=5 items=110 ppid=1013 pid=1039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:42.178000 audit: CWD cwd="/" May 15 10:38:42.178000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=1 name=(null) inode=11828 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=2 name=(null) inode=11828 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=3 name=(null) inode=11829 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=4 name=(null) inode=11828 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=5 name=(null) inode=11830 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=6 name=(null) inode=11828 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=7 name=(null) inode=11831 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=8 name=(null) inode=11831 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=9 name=(null) inode=11832 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=10 name=(null) inode=11831 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=11 name=(null) inode=11833 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=12 name=(null) inode=11831 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=13 name=(null) inode=11834 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=14 name=(null) inode=11831 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=15 name=(null) inode=11835 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=16 name=(null) inode=11831 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=17 name=(null) inode=11836 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=18 name=(null) inode=11828 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=19 name=(null) inode=11837 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=20 name=(null) inode=11837 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=21 name=(null) inode=11838 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=22 name=(null) inode=11837 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=23 name=(null) inode=11839 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=24 name=(null) inode=11837 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=25 name=(null) inode=11840 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=26 name=(null) inode=11837 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=27 name=(null) inode=11841 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=28 name=(null) inode=11837 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=29 name=(null) inode=11842 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=30 name=(null) inode=11828 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=31 name=(null) inode=11843 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=32 name=(null) inode=11843 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=33 name=(null) inode=11844 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=34 name=(null) inode=11843 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=35 name=(null) inode=11845 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=36 name=(null) inode=11843 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=37 name=(null) inode=11846 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=38 name=(null) inode=11843 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=39 name=(null) inode=11847 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=40 name=(null) inode=11843 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=41 name=(null) inode=11848 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=42 name=(null) inode=11828 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=43 name=(null) inode=11849 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=44 name=(null) inode=11849 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=45 name=(null) inode=11850 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=46 name=(null) inode=11849 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=47 name=(null) inode=11851 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=48 name=(null) inode=11849 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=49 name=(null) inode=11852 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=50 name=(null) inode=11849 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=51 name=(null) inode=11853 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=52 name=(null) inode=11849 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=53 name=(null) inode=11854 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=55 name=(null) inode=11855 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=56 name=(null) inode=11855 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=57 name=(null) inode=11856 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=58 name=(null) inode=11855 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=59 name=(null) inode=11857 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=60 name=(null) inode=11855 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=61 name=(null) inode=11858 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=62 name=(null) inode=11858 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=63 name=(null) inode=11859 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=64 name=(null) inode=11858 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=65 name=(null) inode=11860 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=66 name=(null) inode=11858 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=67 name=(null) inode=11861 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=68 name=(null) inode=11858 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=69 name=(null) inode=11862 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=70 name=(null) inode=11858 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=71 name=(null) inode=11863 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=72 name=(null) inode=11855 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=73 name=(null) inode=11864 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=74 name=(null) inode=11864 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=75 name=(null) inode=11865 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=76 name=(null) inode=11864 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=77 name=(null) inode=11866 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=78 name=(null) inode=11864 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=79 name=(null) inode=11867 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=80 name=(null) inode=11864 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=81 name=(null) inode=11868 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=82 name=(null) inode=11864 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=83 name=(null) inode=11869 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=84 name=(null) inode=11855 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=85 name=(null) inode=11870 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=86 name=(null) inode=11870 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=87 name=(null) inode=11871 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=88 name=(null) inode=11870 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=89 name=(null) inode=11872 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=90 name=(null) inode=11870 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=91 name=(null) inode=11873 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=92 name=(null) inode=11870 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=93 name=(null) inode=11874 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=94 name=(null) inode=11870 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=95 name=(null) inode=11875 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=96 name=(null) inode=11855 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=97 name=(null) inode=11876 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=98 name=(null) inode=11876 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=99 name=(null) inode=11877 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=100 name=(null) inode=11876 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=101 name=(null) inode=11878 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=102 name=(null) inode=11876 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=103 name=(null) inode=11879 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=104 name=(null) inode=11876 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=105 name=(null) inode=11880 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=106 name=(null) inode=11876 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=107 name=(null) inode=11881 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PATH item=109 name=(null) inode=11882 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:42.178000 audit: PROCTITLE proctitle="(udev-worker)" May 15 10:38:42.199851 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 May 15 10:38:42.214848 kernel: mousedev: PS/2 mouse device common for all mice May 15 10:38:42.217261 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt May 15 10:38:42.218675 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) May 15 10:38:42.218805 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD May 15 10:38:42.271769 kernel: kvm: Nested Virtualization enabled May 15 10:38:42.271898 kernel: SVM: kvm: Nested Paging enabled May 15 10:38:42.271914 kernel: SVM: Virtual VMLOAD VMSAVE supported May 15 10:38:42.271926 kernel: SVM: Virtual GIF supported May 15 10:38:42.287848 kernel: EDAC MC: Ver: 3.0.0 May 15 10:38:42.312199 systemd[1]: Finished systemd-udev-settle.service. May 15 10:38:42.313000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:42.314297 systemd[1]: Starting lvm2-activation-early.service... May 15 10:38:42.329878 lvm[1047]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 15 10:38:42.371736 systemd[1]: Finished lvm2-activation-early.service. May 15 10:38:42.371000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:42.372796 systemd[1]: Reached target cryptsetup.target. May 15 10:38:42.374523 systemd[1]: Starting lvm2-activation.service... May 15 10:38:42.378077 lvm[1048]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 15 10:38:42.402726 systemd[1]: Finished lvm2-activation.service. May 15 10:38:42.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:42.403738 systemd[1]: Reached target local-fs-pre.target. May 15 10:38:42.404596 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 15 10:38:42.404614 systemd[1]: Reached target local-fs.target. May 15 10:38:42.405411 systemd[1]: Reached target machines.target. May 15 10:38:42.407251 systemd[1]: Starting ldconfig.service... May 15 10:38:42.408332 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:38:42.408411 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:38:42.409920 systemd[1]: Starting systemd-boot-update.service... May 15 10:38:42.411785 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 15 10:38:42.413837 systemd[1]: Starting systemd-machine-id-commit.service... May 15 10:38:42.416080 systemd[1]: Starting systemd-sysext.service... May 15 10:38:42.417238 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1050 (bootctl) May 15 10:38:42.418481 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 15 10:38:42.425303 systemd[1]: Unmounting usr-share-oem.mount... May 15 10:38:42.429874 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 15 10:38:42.430013 systemd[1]: Unmounted usr-share-oem.mount. May 15 10:38:42.437000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:42.438911 kernel: loop0: detected capacity change from 0 to 210664 May 15 10:38:42.435988 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 15 10:38:42.695838 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 15 10:38:42.705484 systemd-fsck[1060]: fsck.fat 4.2 (2021-01-31) May 15 10:38:42.705484 systemd-fsck[1060]: /dev/vda1: 790 files, 120732/258078 clusters May 15 10:38:42.707131 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 15 10:38:42.708000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:42.710381 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 15 10:38:42.711171 systemd[1]: Finished systemd-machine-id-commit.service. May 15 10:38:42.711000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:42.715832 kernel: loop1: detected capacity change from 0 to 210664 May 15 10:38:42.715992 systemd[1]: Mounting boot.mount... May 15 10:38:42.720614 (sd-sysext)[1063]: Using extensions 'kubernetes'. May 15 10:38:42.721020 (sd-sysext)[1063]: Merged extensions into '/usr'. May 15 10:38:42.733500 systemd[1]: Mounted boot.mount. May 15 10:38:42.742515 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:38:42.744069 systemd[1]: Mounting usr-share-oem.mount... May 15 10:38:42.745137 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 10:38:42.746178 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:38:42.758495 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:38:42.760579 systemd[1]: Starting modprobe@loop.service... May 15 10:38:42.762464 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:38:42.762629 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:38:42.762744 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:38:42.765322 systemd[1]: Finished systemd-boot-update.service. May 15 10:38:42.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:42.766590 systemd[1]: Mounted usr-share-oem.mount. May 15 10:38:42.767734 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:38:42.767878 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:38:42.768000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:42.768000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:42.769183 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:38:42.769284 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:38:42.769000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:42.769000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:42.770635 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:38:42.770727 systemd[1]: Finished modprobe@loop.service. May 15 10:38:42.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:42.770000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:42.772038 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 10:38:42.772124 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 10:38:42.773123 systemd[1]: Finished systemd-sysext.service. May 15 10:38:42.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:42.775208 systemd[1]: Starting ensure-sysext.service... May 15 10:38:42.776881 systemd[1]: Starting systemd-tmpfiles-setup.service... May 15 10:38:42.781169 systemd[1]: Reloading. May 15 10:38:42.794462 systemd-tmpfiles[1071]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 15 10:38:42.796954 systemd-tmpfiles[1071]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 15 10:38:42.800436 systemd-tmpfiles[1071]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 15 10:38:42.813844 ldconfig[1049]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 15 10:38:42.867015 /usr/lib/systemd/system-generators/torcx-generator[1091]: time="2025-05-15T10:38:42Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 10:38:42.867328 /usr/lib/systemd/system-generators/torcx-generator[1091]: time="2025-05-15T10:38:42Z" level=info msg="torcx already run" May 15 10:38:42.916189 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 10:38:42.916206 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 10:38:42.934022 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 10:38:42.988000 audit: BPF prog-id=27 op=LOAD May 15 10:38:42.989000 audit: BPF prog-id=28 op=LOAD May 15 10:38:42.989000 audit: BPF prog-id=21 op=UNLOAD May 15 10:38:42.989000 audit: BPF prog-id=22 op=UNLOAD May 15 10:38:42.990000 audit: BPF prog-id=29 op=LOAD May 15 10:38:42.990000 audit: BPF prog-id=18 op=UNLOAD May 15 10:38:42.990000 audit: BPF prog-id=30 op=LOAD May 15 10:38:42.990000 audit: BPF prog-id=31 op=LOAD May 15 10:38:42.990000 audit: BPF prog-id=19 op=UNLOAD May 15 10:38:42.990000 audit: BPF prog-id=20 op=UNLOAD May 15 10:38:42.991000 audit: BPF prog-id=32 op=LOAD May 15 10:38:42.991000 audit: BPF prog-id=23 op=UNLOAD May 15 10:38:42.992000 audit: BPF prog-id=33 op=LOAD May 15 10:38:42.992000 audit: BPF prog-id=24 op=UNLOAD May 15 10:38:42.992000 audit: BPF prog-id=34 op=LOAD May 15 10:38:42.992000 audit: BPF prog-id=35 op=LOAD May 15 10:38:42.992000 audit: BPF prog-id=25 op=UNLOAD May 15 10:38:42.992000 audit: BPF prog-id=26 op=UNLOAD May 15 10:38:42.996279 systemd[1]: Finished ldconfig.service. May 15 10:38:42.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:42.998318 systemd[1]: Finished systemd-tmpfiles-setup.service. May 15 10:38:42.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:43.001728 systemd[1]: Starting audit-rules.service... May 15 10:38:43.003829 systemd[1]: Starting clean-ca-certificates.service... May 15 10:38:43.006068 systemd[1]: Starting systemd-journal-catalog-update.service... May 15 10:38:43.007000 audit: BPF prog-id=36 op=LOAD May 15 10:38:43.009129 systemd[1]: Starting systemd-resolved.service... May 15 10:38:43.010000 audit: BPF prog-id=37 op=LOAD May 15 10:38:43.012040 systemd[1]: Starting systemd-timesyncd.service... May 15 10:38:43.014173 systemd[1]: Starting systemd-update-utmp.service... May 15 10:38:43.015972 systemd[1]: Finished clean-ca-certificates.service. May 15 10:38:43.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:43.019000 audit[1145]: SYSTEM_BOOT pid=1145 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 15 10:38:43.025612 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:38:43.025928 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 10:38:43.027798 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:38:43.028000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 15 10:38:43.028000 audit[1154]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcf0b2a710 a2=420 a3=0 items=0 ppid=1133 pid=1154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:43.028000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 15 10:38:43.029177 augenrules[1154]: No rules May 15 10:38:43.030367 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:38:43.032510 systemd[1]: Starting modprobe@loop.service... May 15 10:38:43.033553 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:38:43.033735 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:38:43.034039 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 10:38:43.034228 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:38:43.036194 systemd[1]: Finished audit-rules.service. May 15 10:38:43.037537 systemd[1]: Finished systemd-journal-catalog-update.service. May 15 10:38:43.039146 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:38:43.039291 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:38:43.040705 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:38:43.040864 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:38:43.042257 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:38:43.042385 systemd[1]: Finished modprobe@loop.service. May 15 10:38:43.044550 systemd[1]: Finished systemd-update-utmp.service. May 15 10:38:43.047825 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:38:43.048038 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 10:38:43.049268 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:38:43.051262 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:38:43.053185 systemd[1]: Starting modprobe@loop.service... May 15 10:38:43.054177 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:38:43.054306 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:38:43.055389 systemd[1]: Starting systemd-update-done.service... May 15 10:38:43.056608 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 10:38:43.056732 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:38:43.058214 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:38:43.058393 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:38:43.059989 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:38:43.060165 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:38:43.061883 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:38:43.062066 systemd[1]: Finished modprobe@loop.service. May 15 10:38:43.063283 systemd[1]: Finished systemd-update-done.service. May 15 10:38:43.064592 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 10:38:43.064721 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 10:38:43.067191 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:38:43.067451 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 10:38:43.069259 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:38:43.082325 systemd[1]: Starting modprobe@drm.service... May 15 10:38:43.084503 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:38:43.086676 systemd[1]: Starting modprobe@loop.service... May 15 10:38:43.087740 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:38:43.088005 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:38:43.089183 systemd[1]: Starting systemd-networkd-wait-online.service... May 15 10:38:43.090324 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 10:38:43.090459 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:38:43.091494 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:38:43.091646 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:38:43.093079 systemd[1]: modprobe@drm.service: Deactivated successfully. May 15 10:38:43.093215 systemd[1]: Finished modprobe@drm.service. May 15 10:38:43.094417 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:38:43.094564 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:38:43.095877 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:38:43.096017 systemd[1]: Finished modprobe@loop.service. May 15 10:38:43.097398 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 10:38:43.097507 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 10:38:43.098559 systemd[1]: Finished ensure-sysext.service. May 15 10:38:43.118645 systemd-resolved[1140]: Positive Trust Anchors: May 15 10:38:43.118661 systemd-resolved[1140]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 15 10:38:43.118686 systemd-resolved[1140]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 15 10:38:43.128912 systemd-resolved[1140]: Defaulting to hostname 'linux'. May 15 10:38:43.130288 systemd[1]: Started systemd-timesyncd.service. May 15 10:38:43.131594 systemd[1]: Started systemd-resolved.service. May 15 10:38:43.131655 systemd-timesyncd[1143]: Contacted time server 10.0.0.1:123 (10.0.0.1). May 15 10:38:43.131700 systemd-timesyncd[1143]: Initial clock synchronization to Thu 2025-05-15 10:38:42.980220 UTC. May 15 10:38:43.132533 systemd[1]: Reached target network.target. May 15 10:38:43.133340 systemd[1]: Reached target nss-lookup.target. May 15 10:38:43.134202 systemd[1]: Reached target sysinit.target. May 15 10:38:43.135139 systemd[1]: Started motdgen.path. May 15 10:38:43.135927 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 15 10:38:43.137089 systemd[1]: Started systemd-tmpfiles-clean.timer. May 15 10:38:43.138004 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 15 10:38:43.138033 systemd[1]: Reached target paths.target. May 15 10:38:43.138847 systemd[1]: Reached target time-set.target. May 15 10:38:43.139788 systemd[1]: Started logrotate.timer. May 15 10:38:43.140632 systemd[1]: Started mdadm.timer. May 15 10:38:43.141375 systemd[1]: Reached target timers.target. May 15 10:38:43.143094 systemd[1]: Listening on dbus.socket. May 15 10:38:43.144725 systemd[1]: Starting docker.socket... May 15 10:38:43.147216 systemd[1]: Listening on sshd.socket. May 15 10:38:43.148090 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:38:43.148386 systemd[1]: Listening on docker.socket. May 15 10:38:43.149255 systemd[1]: Reached target sockets.target. May 15 10:38:43.150070 systemd[1]: Reached target basic.target. May 15 10:38:43.150882 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 15 10:38:43.150905 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 15 10:38:43.151653 systemd[1]: Starting containerd.service... May 15 10:38:43.153262 systemd[1]: Starting dbus.service... May 15 10:38:43.155239 systemd[1]: Starting enable-oem-cloudinit.service... May 15 10:38:43.157758 systemd[1]: Starting extend-filesystems.service... May 15 10:38:43.158889 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 15 10:38:43.160219 systemd[1]: Starting motdgen.service... May 15 10:38:43.160910 jq[1175]: false May 15 10:38:43.163297 systemd[1]: Starting ssh-key-proc-cmdline.service... May 15 10:38:43.166888 systemd[1]: Starting sshd-keygen.service... May 15 10:38:43.169768 extend-filesystems[1176]: Found loop1 May 15 10:38:43.170952 extend-filesystems[1176]: Found sr0 May 15 10:38:43.170952 extend-filesystems[1176]: Found vda May 15 10:38:43.170952 extend-filesystems[1176]: Found vda1 May 15 10:38:43.174147 dbus-daemon[1174]: [system] SELinux support is enabled May 15 10:38:43.174489 extend-filesystems[1176]: Found vda2 May 15 10:38:43.174489 extend-filesystems[1176]: Found vda3 May 15 10:38:43.174489 extend-filesystems[1176]: Found usr May 15 10:38:43.174489 extend-filesystems[1176]: Found vda4 May 15 10:38:43.174489 extend-filesystems[1176]: Found vda6 May 15 10:38:43.174489 extend-filesystems[1176]: Found vda7 May 15 10:38:43.174489 extend-filesystems[1176]: Found vda9 May 15 10:38:43.174489 extend-filesystems[1176]: Checking size of /dev/vda9 May 15 10:38:43.177984 systemd[1]: Starting systemd-logind.service... May 15 10:38:43.181459 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:38:43.183873 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 15 10:38:43.185541 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 15 10:38:43.186482 systemd[1]: Starting update-engine.service... May 15 10:38:43.188758 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 15 10:38:43.193735 jq[1195]: true May 15 10:38:43.190722 systemd[1]: Started dbus.service. May 15 10:38:43.200415 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 15 10:38:43.200627 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 15 10:38:43.200976 systemd[1]: motdgen.service: Deactivated successfully. May 15 10:38:43.201150 systemd[1]: Finished motdgen.service. May 15 10:38:43.202419 extend-filesystems[1176]: Resized partition /dev/vda9 May 15 10:38:43.205842 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 15 10:38:43.206031 systemd[1]: Finished ssh-key-proc-cmdline.service. May 15 10:38:43.214806 extend-filesystems[1199]: resize2fs 1.46.5 (30-Dec-2021) May 15 10:38:43.216958 jq[1201]: true May 15 10:38:43.226770 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 15 10:38:43.226801 systemd[1]: Reached target system-config.target. May 15 10:38:43.229125 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks May 15 10:38:43.229915 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 15 10:38:43.229958 systemd[1]: Reached target user-config.target. May 15 10:38:43.318913 env[1202]: time="2025-05-15T10:38:43.318834317Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 15 10:38:43.333582 env[1202]: time="2025-05-15T10:38:43.333558415Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 15 10:38:43.333705 env[1202]: time="2025-05-15T10:38:43.333682157Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 15 10:38:43.335091 systemd-logind[1193]: Watching system buttons on /dev/input/event1 (Power Button) May 15 10:38:43.335474 env[1202]: time="2025-05-15T10:38:43.335169728Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.182-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 15 10:38:43.335474 env[1202]: time="2025-05-15T10:38:43.335196648Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 15 10:38:43.335474 env[1202]: time="2025-05-15T10:38:43.335381154Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 15 10:38:43.335474 env[1202]: time="2025-05-15T10:38:43.335394840Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 15 10:38:43.335474 env[1202]: time="2025-05-15T10:38:43.335405199Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 15 10:38:43.335474 env[1202]: time="2025-05-15T10:38:43.335413054Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 15 10:38:43.335109 systemd-logind[1193]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 15 10:38:43.335784 env[1202]: time="2025-05-15T10:38:43.335478377Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 15 10:38:43.335784 env[1202]: time="2025-05-15T10:38:43.335656471Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 15 10:38:43.335784 env[1202]: time="2025-05-15T10:38:43.335760826Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 15 10:38:43.335784 env[1202]: time="2025-05-15T10:38:43.335773881Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 15 10:38:43.335875 env[1202]: time="2025-05-15T10:38:43.335826970Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 15 10:38:43.335875 env[1202]: time="2025-05-15T10:38:43.335841207Z" level=info msg="metadata content store policy set" policy=shared May 15 10:38:43.336042 systemd-logind[1193]: New seat seat0. May 15 10:38:43.338190 systemd[1]: Started systemd-logind.service. May 15 10:38:43.347840 kernel: EXT4-fs (vda9): resized filesystem to 1864699 May 15 10:38:43.387389 extend-filesystems[1199]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 15 10:38:43.387389 extend-filesystems[1199]: old_desc_blocks = 1, new_desc_blocks = 1 May 15 10:38:43.387389 extend-filesystems[1199]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. May 15 10:38:43.391731 extend-filesystems[1176]: Resized filesystem in /dev/vda9 May 15 10:38:43.392791 systemd[1]: extend-filesystems.service: Deactivated successfully. May 15 10:38:43.393009 systemd[1]: Finished extend-filesystems.service. May 15 10:38:43.395057 bash[1217]: Updated "/home/core/.ssh/authorized_keys" May 15 10:38:43.395884 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 15 10:38:43.396222 env[1202]: time="2025-05-15T10:38:43.396171429Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 15 10:38:43.396288 env[1202]: time="2025-05-15T10:38:43.396243985Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 15 10:38:43.396288 env[1202]: time="2025-05-15T10:38:43.396263562Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 15 10:38:43.396329 env[1202]: time="2025-05-15T10:38:43.396317934Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 15 10:38:43.396350 env[1202]: time="2025-05-15T10:38:43.396340667Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 15 10:38:43.396371 env[1202]: time="2025-05-15T10:38:43.396361887Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 15 10:38:43.396392 env[1202]: time="2025-05-15T10:38:43.396378698Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 15 10:38:43.396413 env[1202]: time="2025-05-15T10:38:43.396401561Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 15 10:38:43.396436 env[1202]: time="2025-05-15T10:38:43.396423242Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 15 10:38:43.396483 env[1202]: time="2025-05-15T10:38:43.396441716Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 15 10:38:43.396545 env[1202]: time="2025-05-15T10:38:43.396484436Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 15 10:38:43.396545 env[1202]: time="2025-05-15T10:38:43.396501288Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 15 10:38:43.396684 env[1202]: time="2025-05-15T10:38:43.396653423Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 15 10:38:43.396771 env[1202]: time="2025-05-15T10:38:43.396749704Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 15 10:38:43.397111 env[1202]: time="2025-05-15T10:38:43.397088610Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 15 10:38:43.397166 env[1202]: time="2025-05-15T10:38:43.397129657Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 15 10:38:43.397190 env[1202]: time="2025-05-15T10:38:43.397162228Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 15 10:38:43.397251 env[1202]: time="2025-05-15T10:38:43.397230275Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 15 10:38:43.397312 env[1202]: time="2025-05-15T10:38:43.397253800Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 15 10:38:43.397312 env[1202]: time="2025-05-15T10:38:43.397274088Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 15 10:38:43.397312 env[1202]: time="2025-05-15T10:38:43.397288585Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 15 10:38:43.397312 env[1202]: time="2025-05-15T10:38:43.397304004Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 15 10:38:43.397388 env[1202]: time="2025-05-15T10:38:43.397325404Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 15 10:38:43.397388 env[1202]: time="2025-05-15T10:38:43.397349118Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 15 10:38:43.397388 env[1202]: time="2025-05-15T10:38:43.397365098Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 15 10:38:43.397455 env[1202]: time="2025-05-15T10:38:43.397386509Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 15 10:38:43.397575 env[1202]: time="2025-05-15T10:38:43.397541269Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 15 10:38:43.397627 env[1202]: time="2025-05-15T10:38:43.397577687Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 15 10:38:43.397627 env[1202]: time="2025-05-15T10:38:43.397593918Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 15 10:38:43.397627 env[1202]: time="2025-05-15T10:38:43.397611290Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 15 10:38:43.397730 env[1202]: time="2025-05-15T10:38:43.397645705Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 15 10:38:43.397730 env[1202]: time="2025-05-15T10:38:43.397665622Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 15 10:38:43.397777 env[1202]: time="2025-05-15T10:38:43.397712159Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 15 10:38:43.397799 env[1202]: time="2025-05-15T10:38:43.397786689Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 15 10:38:43.398134 env[1202]: time="2025-05-15T10:38:43.398075791Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 15 10:38:43.398797 env[1202]: time="2025-05-15T10:38:43.398142126Z" level=info msg="Connect containerd service" May 15 10:38:43.398797 env[1202]: time="2025-05-15T10:38:43.398178975Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 15 10:38:43.399657 env[1202]: time="2025-05-15T10:38:43.399627943Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 15 10:38:43.401114 env[1202]: time="2025-05-15T10:38:43.401024833Z" level=info msg="Start subscribing containerd event" May 15 10:38:43.401325 env[1202]: time="2025-05-15T10:38:43.401171708Z" level=info msg="Start recovering state" May 15 10:38:43.401325 env[1202]: time="2025-05-15T10:38:43.401286083Z" level=info msg="Start event monitor" May 15 10:38:43.401325 env[1202]: time="2025-05-15T10:38:43.401317502Z" level=info msg="Start snapshots syncer" May 15 10:38:43.401447 env[1202]: time="2025-05-15T10:38:43.401334133Z" level=info msg="Start cni network conf syncer for default" May 15 10:38:43.401447 env[1202]: time="2025-05-15T10:38:43.401342288Z" level=info msg="Start streaming server" May 15 10:38:43.401770 env[1202]: time="2025-05-15T10:38:43.401725617Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 15 10:38:43.401841 env[1202]: time="2025-05-15T10:38:43.401788545Z" level=info msg=serving... address=/run/containerd/containerd.sock May 15 10:38:43.402135 systemd[1]: Started containerd.service. May 15 10:38:43.404025 env[1202]: time="2025-05-15T10:38:43.403991888Z" level=info msg="containerd successfully booted in 0.086141s" May 15 10:38:43.408284 update_engine[1194]: I0515 10:38:43.407979 1194 main.cc:92] Flatcar Update Engine starting May 15 10:38:43.409540 systemd[1]: Started update-engine.service. May 15 10:38:43.411989 systemd[1]: Started locksmithd.service. May 15 10:38:43.413175 update_engine[1194]: I0515 10:38:43.413142 1194 update_check_scheduler.cc:74] Next update check in 4m17s May 15 10:38:43.445430 locksmithd[1228]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 15 10:38:43.660963 systemd-networkd[1020]: eth0: Gained IPv6LL May 15 10:38:43.662540 systemd[1]: Finished systemd-networkd-wait-online.service. May 15 10:38:43.663899 systemd[1]: Reached target network-online.target. May 15 10:38:43.666265 systemd[1]: Starting kubelet.service... May 15 10:38:44.309629 systemd[1]: Started kubelet.service. May 15 10:38:44.623434 sshd_keygen[1191]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 15 10:38:44.641254 systemd[1]: Finished sshd-keygen.service. May 15 10:38:44.643419 systemd[1]: Starting issuegen.service... May 15 10:38:44.648147 systemd[1]: issuegen.service: Deactivated successfully. May 15 10:38:44.648341 systemd[1]: Finished issuegen.service. May 15 10:38:44.650760 systemd[1]: Starting systemd-user-sessions.service... May 15 10:38:44.657455 systemd[1]: Finished systemd-user-sessions.service. May 15 10:38:44.659653 systemd[1]: Started getty@tty1.service. May 15 10:38:44.661404 systemd[1]: Started serial-getty@ttyS0.service. May 15 10:38:44.662468 systemd[1]: Reached target getty.target. May 15 10:38:44.663571 systemd[1]: Reached target multi-user.target. May 15 10:38:44.665503 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 15 10:38:44.671422 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 15 10:38:44.671540 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 15 10:38:44.672662 systemd[1]: Startup finished in 617ms (kernel) + 4.889s (initrd) + 6.065s (userspace) = 11.572s. May 15 10:38:44.736662 kubelet[1237]: E0515 10:38:44.736612 1237 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 10:38:44.738320 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 10:38:44.738458 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 10:38:46.582504 systemd[1]: Created slice system-sshd.slice. May 15 10:38:46.583828 systemd[1]: Started sshd@0-10.0.0.55:22-10.0.0.1:55870.service. May 15 10:38:46.633157 sshd[1260]: Accepted publickey for core from 10.0.0.1 port 55870 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:38:46.635247 sshd[1260]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:38:46.645984 systemd-logind[1193]: New session 1 of user core. May 15 10:38:46.647174 systemd[1]: Created slice user-500.slice. May 15 10:38:46.648501 systemd[1]: Starting user-runtime-dir@500.service... May 15 10:38:46.658783 systemd[1]: Finished user-runtime-dir@500.service. May 15 10:38:46.660169 systemd[1]: Starting user@500.service... May 15 10:38:46.663903 (systemd)[1263]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 15 10:38:46.777772 systemd[1263]: Queued start job for default target default.target. May 15 10:38:46.778420 systemd[1263]: Reached target paths.target. May 15 10:38:46.778452 systemd[1263]: Reached target sockets.target. May 15 10:38:46.778465 systemd[1263]: Reached target timers.target. May 15 10:38:46.778477 systemd[1263]: Reached target basic.target. May 15 10:38:46.778527 systemd[1263]: Reached target default.target. May 15 10:38:46.778557 systemd[1263]: Startup finished in 107ms. May 15 10:38:46.778714 systemd[1]: Started user@500.service. May 15 10:38:46.780014 systemd[1]: Started session-1.scope. May 15 10:38:46.848932 systemd[1]: Started sshd@1-10.0.0.55:22-10.0.0.1:55882.service. May 15 10:38:46.892320 sshd[1272]: Accepted publickey for core from 10.0.0.1 port 55882 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:38:46.893460 sshd[1272]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:38:46.898213 systemd-logind[1193]: New session 2 of user core. May 15 10:38:46.898921 systemd[1]: Started session-2.scope. May 15 10:38:46.954911 sshd[1272]: pam_unix(sshd:session): session closed for user core May 15 10:38:46.958473 systemd[1]: sshd@1-10.0.0.55:22-10.0.0.1:55882.service: Deactivated successfully. May 15 10:38:46.959098 systemd[1]: session-2.scope: Deactivated successfully. May 15 10:38:46.960179 systemd-logind[1193]: Session 2 logged out. Waiting for processes to exit. May 15 10:38:46.960633 systemd[1]: Started sshd@2-10.0.0.55:22-10.0.0.1:55888.service. May 15 10:38:46.961451 systemd-logind[1193]: Removed session 2. May 15 10:38:47.002505 sshd[1278]: Accepted publickey for core from 10.0.0.1 port 55888 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:38:47.004213 sshd[1278]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:38:47.008089 systemd-logind[1193]: New session 3 of user core. May 15 10:38:47.008981 systemd[1]: Started session-3.scope. May 15 10:38:47.062045 sshd[1278]: pam_unix(sshd:session): session closed for user core May 15 10:38:47.068300 systemd[1]: Started sshd@3-10.0.0.55:22-10.0.0.1:55902.service. May 15 10:38:47.068920 systemd[1]: sshd@2-10.0.0.55:22-10.0.0.1:55888.service: Deactivated successfully. May 15 10:38:47.069633 systemd[1]: session-3.scope: Deactivated successfully. May 15 10:38:47.070401 systemd-logind[1193]: Session 3 logged out. Waiting for processes to exit. May 15 10:38:47.071935 systemd-logind[1193]: Removed session 3. May 15 10:38:47.112025 sshd[1283]: Accepted publickey for core from 10.0.0.1 port 55902 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:38:47.113920 sshd[1283]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:38:47.119971 systemd-logind[1193]: New session 4 of user core. May 15 10:38:47.120222 systemd[1]: Started session-4.scope. May 15 10:38:47.187276 sshd[1283]: pam_unix(sshd:session): session closed for user core May 15 10:38:47.192114 systemd[1]: Started sshd@4-10.0.0.55:22-10.0.0.1:55916.service. May 15 10:38:47.192763 systemd[1]: sshd@3-10.0.0.55:22-10.0.0.1:55902.service: Deactivated successfully. May 15 10:38:47.193456 systemd[1]: session-4.scope: Deactivated successfully. May 15 10:38:47.194062 systemd-logind[1193]: Session 4 logged out. Waiting for processes to exit. May 15 10:38:47.194980 systemd-logind[1193]: Removed session 4. May 15 10:38:47.236975 sshd[1289]: Accepted publickey for core from 10.0.0.1 port 55916 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:38:47.239486 sshd[1289]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:38:47.245927 systemd[1]: Started session-5.scope. May 15 10:38:47.246530 systemd-logind[1193]: New session 5 of user core. May 15 10:38:47.321401 sudo[1294]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 15 10:38:47.321738 sudo[1294]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 10:38:47.338529 dbus-daemon[1174]: \xd0=:\xe1\xd4U: received setenforce notice (enforcing=-1416339376) May 15 10:38:47.340284 sudo[1294]: pam_unix(sudo:session): session closed for user root May 15 10:38:47.344281 sshd[1289]: pam_unix(sshd:session): session closed for user core May 15 10:38:47.348244 systemd[1]: Started sshd@5-10.0.0.55:22-10.0.0.1:55920.service. May 15 10:38:47.348687 systemd[1]: sshd@4-10.0.0.55:22-10.0.0.1:55916.service: Deactivated successfully. May 15 10:38:47.349496 systemd[1]: session-5.scope: Deactivated successfully. May 15 10:38:47.350220 systemd-logind[1193]: Session 5 logged out. Waiting for processes to exit. May 15 10:38:47.351339 systemd-logind[1193]: Removed session 5. May 15 10:38:47.390643 sshd[1297]: Accepted publickey for core from 10.0.0.1 port 55920 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:38:47.392121 sshd[1297]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:38:47.396506 systemd-logind[1193]: New session 6 of user core. May 15 10:38:47.397536 systemd[1]: Started session-6.scope. May 15 10:38:47.451840 sudo[1302]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 15 10:38:47.452039 sudo[1302]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 10:38:47.455592 sudo[1302]: pam_unix(sudo:session): session closed for user root May 15 10:38:47.460737 sudo[1301]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 15 10:38:47.460978 sudo[1301]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 10:38:47.471555 systemd[1]: Stopping audit-rules.service... May 15 10:38:47.472000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 15 10:38:47.473498 auditctl[1305]: No rules May 15 10:38:47.473781 systemd[1]: audit-rules.service: Deactivated successfully. May 15 10:38:47.473960 systemd[1]: Stopped audit-rules.service. May 15 10:38:47.474281 kernel: kauditd_printk_skb: 266 callbacks suppressed May 15 10:38:47.474347 kernel: audit: type=1305 audit(1747305527.472:186): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 15 10:38:47.475592 systemd[1]: Starting audit-rules.service... May 15 10:38:47.472000 audit[1305]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd0f701760 a2=420 a3=0 items=0 ppid=1 pid=1305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:47.481717 kernel: audit: type=1300 audit(1747305527.472:186): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd0f701760 a2=420 a3=0 items=0 ppid=1 pid=1305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:47.481846 kernel: audit: type=1327 audit(1747305527.472:186): proctitle=2F7362696E2F617564697463746C002D44 May 15 10:38:47.472000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 15 10:38:47.483384 kernel: audit: type=1131 audit(1747305527.473:187): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:47.473000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:47.498285 augenrules[1322]: No rules May 15 10:38:47.498958 systemd[1]: Finished audit-rules.service. May 15 10:38:47.498000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:47.500260 sudo[1301]: pam_unix(sudo:session): session closed for user root May 15 10:38:47.502124 sshd[1297]: pam_unix(sshd:session): session closed for user core May 15 10:38:47.499000 audit[1301]: USER_END pid=1301 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:38:47.505197 systemd[1]: sshd@5-10.0.0.55:22-10.0.0.1:55920.service: Deactivated successfully. May 15 10:38:47.505872 systemd[1]: session-6.scope: Deactivated successfully. May 15 10:38:47.506432 systemd-logind[1193]: Session 6 logged out. Waiting for processes to exit. May 15 10:38:47.507794 kernel: audit: type=1130 audit(1747305527.498:188): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:47.507993 kernel: audit: type=1106 audit(1747305527.499:189): pid=1301 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:38:47.508027 kernel: audit: type=1104 audit(1747305527.499:190): pid=1301 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:38:47.499000 audit[1301]: CRED_DISP pid=1301 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:38:47.507751 systemd[1]: Started sshd@6-10.0.0.55:22-10.0.0.1:55922.service. May 15 10:38:47.509142 systemd-logind[1193]: Removed session 6. May 15 10:38:47.502000 audit[1297]: USER_END pid=1297 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:38:47.516093 kernel: audit: type=1106 audit(1747305527.502:191): pid=1297 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:38:47.516205 kernel: audit: type=1104 audit(1747305527.502:192): pid=1297 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:38:47.502000 audit[1297]: CRED_DISP pid=1297 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:38:47.519939 kernel: audit: type=1131 audit(1747305527.504:193): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.55:22-10.0.0.1:55920 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:47.504000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.55:22-10.0.0.1:55920 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:47.507000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.55:22-10.0.0.1:55922 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:47.556000 audit[1328]: USER_ACCT pid=1328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:38:47.557126 sshd[1328]: Accepted publickey for core from 10.0.0.1 port 55922 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:38:47.556000 audit[1328]: CRED_ACQ pid=1328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:38:47.557000 audit[1328]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5b5eb7a0 a2=3 a3=0 items=0 ppid=1 pid=1328 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:47.557000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:38:47.558122 sshd[1328]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:38:47.562535 systemd-logind[1193]: New session 7 of user core. May 15 10:38:47.563355 systemd[1]: Started session-7.scope. May 15 10:38:47.567000 audit[1328]: USER_START pid=1328 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:38:47.568000 audit[1330]: CRED_ACQ pid=1330 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:38:47.617000 audit[1331]: USER_ACCT pid=1331 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:38:47.617000 audit[1331]: CRED_REFR pid=1331 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:38:47.618495 sudo[1331]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 15 10:38:47.618733 sudo[1331]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 10:38:47.619000 audit[1331]: USER_START pid=1331 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:38:47.632412 systemd[1]: Starting coreos-metadata.service... May 15 10:38:47.645956 systemd[1]: coreos-metadata.service: Deactivated successfully. May 15 10:38:47.646146 systemd[1]: Finished coreos-metadata.service. May 15 10:38:47.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:47.644000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:48.890911 systemd[1]: Stopped kubelet.service. May 15 10:38:48.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:48.890000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:48.893344 systemd[1]: Starting kubelet.service... May 15 10:38:48.917482 systemd[1]: Reloading. May 15 10:38:48.997336 /usr/lib/systemd/system-generators/torcx-generator[1396]: time="2025-05-15T10:38:48Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 10:38:48.997361 /usr/lib/systemd/system-generators/torcx-generator[1396]: time="2025-05-15T10:38:48Z" level=info msg="torcx already run" May 15 10:38:49.656571 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 10:38:49.656603 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 10:38:49.681411 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 10:38:49.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.769000 audit: BPF prog-id=43 op=LOAD May 15 10:38:49.769000 audit: BPF prog-id=38 op=UNLOAD May 15 10:38:49.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.769000 audit: BPF prog-id=44 op=LOAD May 15 10:38:49.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.769000 audit: BPF prog-id=45 op=LOAD May 15 10:38:49.769000 audit: BPF prog-id=39 op=UNLOAD May 15 10:38:49.769000 audit: BPF prog-id=40 op=UNLOAD May 15 10:38:49.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.769000 audit: BPF prog-id=46 op=LOAD May 15 10:38:49.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.769000 audit: BPF prog-id=47 op=LOAD May 15 10:38:49.769000 audit: BPF prog-id=27 op=UNLOAD May 15 10:38:49.769000 audit: BPF prog-id=28 op=UNLOAD May 15 10:38:49.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.772000 audit: BPF prog-id=48 op=LOAD May 15 10:38:49.772000 audit: BPF prog-id=29 op=UNLOAD May 15 10:38:49.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.772000 audit: BPF prog-id=49 op=LOAD May 15 10:38:49.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.773000 audit: BPF prog-id=50 op=LOAD May 15 10:38:49.773000 audit: BPF prog-id=30 op=UNLOAD May 15 10:38:49.773000 audit: BPF prog-id=31 op=UNLOAD May 15 10:38:49.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.773000 audit: BPF prog-id=51 op=LOAD May 15 10:38:49.773000 audit: BPF prog-id=37 op=UNLOAD May 15 10:38:49.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.774000 audit: BPF prog-id=52 op=LOAD May 15 10:38:49.774000 audit: BPF prog-id=41 op=UNLOAD May 15 10:38:49.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.777000 audit: BPF prog-id=53 op=LOAD May 15 10:38:49.777000 audit: BPF prog-id=32 op=UNLOAD May 15 10:38:49.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.782000 audit: BPF prog-id=54 op=LOAD May 15 10:38:49.782000 audit: BPF prog-id=33 op=UNLOAD May 15 10:38:49.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.787000 audit: BPF prog-id=55 op=LOAD May 15 10:38:49.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.790000 audit: BPF prog-id=56 op=LOAD May 15 10:38:49.790000 audit: BPF prog-id=34 op=UNLOAD May 15 10:38:49.790000 audit: BPF prog-id=35 op=UNLOAD May 15 10:38:49.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:49.792000 audit: BPF prog-id=57 op=LOAD May 15 10:38:49.792000 audit: BPF prog-id=36 op=UNLOAD May 15 10:38:49.804955 systemd[1]: Started kubelet.service. May 15 10:38:49.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:49.811922 systemd[1]: Stopping kubelet.service... May 15 10:38:49.812937 systemd[1]: kubelet.service: Deactivated successfully. May 15 10:38:49.813135 systemd[1]: Stopped kubelet.service. May 15 10:38:49.812000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:49.815552 systemd[1]: Starting kubelet.service... May 15 10:38:49.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:49.928543 systemd[1]: Started kubelet.service. May 15 10:38:50.270182 kubelet[1451]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 10:38:50.270182 kubelet[1451]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 15 10:38:50.270182 kubelet[1451]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 10:38:50.276397 kubelet[1451]: I0515 10:38:50.273780 1451 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 15 10:38:50.908574 kubelet[1451]: I0515 10:38:50.908507 1451 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" May 15 10:38:50.908574 kubelet[1451]: I0515 10:38:50.908555 1451 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 15 10:38:50.910086 kubelet[1451]: I0515 10:38:50.908865 1451 server.go:927] "Client rotation is on, will bootstrap in background" May 15 10:38:50.937737 kubelet[1451]: I0515 10:38:50.937207 1451 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 15 10:38:50.990080 kubelet[1451]: I0515 10:38:50.984331 1451 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 15 10:38:50.996891 kubelet[1451]: I0515 10:38:50.996758 1451 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 15 10:38:50.997152 kubelet[1451]: I0515 10:38:50.996881 1451 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.0.0.55","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} May 15 10:38:50.999779 kubelet[1451]: I0515 10:38:50.999726 1451 topology_manager.go:138] "Creating topology manager with none policy" May 15 10:38:50.999779 kubelet[1451]: I0515 10:38:50.999761 1451 container_manager_linux.go:301] "Creating device plugin manager" May 15 10:38:50.999985 kubelet[1451]: I0515 10:38:50.999954 1451 state_mem.go:36] "Initialized new in-memory state store" May 15 10:38:51.001066 kubelet[1451]: I0515 10:38:51.001026 1451 kubelet.go:400] "Attempting to sync node with API server" May 15 10:38:51.001066 kubelet[1451]: I0515 10:38:51.001059 1451 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" May 15 10:38:51.001171 kubelet[1451]: I0515 10:38:51.001088 1451 kubelet.go:312] "Adding apiserver pod source" May 15 10:38:51.001171 kubelet[1451]: I0515 10:38:51.001115 1451 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 15 10:38:51.001678 kubelet[1451]: E0515 10:38:51.001635 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:38:51.001828 kubelet[1451]: E0515 10:38:51.001788 1451 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:38:51.016802 kubelet[1451]: I0515 10:38:51.016742 1451 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 15 10:38:51.030545 kubelet[1451]: I0515 10:38:51.029502 1451 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 15 10:38:51.030545 kubelet[1451]: W0515 10:38:51.030344 1451 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 15 10:38:51.032915 kubelet[1451]: I0515 10:38:51.031492 1451 server.go:1264] "Started kubelet" May 15 10:38:51.032915 kubelet[1451]: I0515 10:38:51.031681 1451 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 15 10:38:51.032915 kubelet[1451]: I0515 10:38:51.032238 1451 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 15 10:38:51.033097 kubelet[1451]: I0515 10:38:51.032287 1451 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 15 10:38:51.034000 audit[1451]: AVC avc: denied { mac_admin } for pid=1451 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:51.034000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:38:51.034000 audit[1451]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c2f260 a1=c0009be150 a2=c000c2f230 a3=25 items=0 ppid=1 pid=1451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:51.034000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:38:51.036057 kubelet[1451]: I0515 10:38:51.035965 1451 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 15 10:38:51.035000 audit[1451]: AVC avc: denied { mac_admin } for pid=1451 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:51.035000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:38:51.035000 audit[1451]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00090ec80 a1=c0009be168 a2=c000c2f2f0 a3=25 items=0 ppid=1 pid=1451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:51.035000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:38:51.036458 kubelet[1451]: I0515 10:38:51.036435 1451 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 15 10:38:51.036643 kubelet[1451]: I0515 10:38:51.036619 1451 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 15 10:38:51.036701 kubelet[1451]: I0515 10:38:51.036689 1451 server.go:455] "Adding debug handlers to kubelet server" May 15 10:38:51.040744 kubelet[1451]: E0515 10:38:51.040203 1451 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.55\" not found" May 15 10:38:51.040744 kubelet[1451]: I0515 10:38:51.040284 1451 volume_manager.go:291] "Starting Kubelet Volume Manager" May 15 10:38:51.040744 kubelet[1451]: I0515 10:38:51.040393 1451 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 15 10:38:51.040744 kubelet[1451]: I0515 10:38:51.040460 1451 reconciler.go:26] "Reconciler: start to sync state" May 15 10:38:51.049705 kubelet[1451]: I0515 10:38:51.042748 1451 factory.go:221] Registration of the systemd container factory successfully May 15 10:38:51.049705 kubelet[1451]: E0515 10:38:51.043356 1451 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 15 10:38:51.049705 kubelet[1451]: I0515 10:38:51.048953 1451 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 15 10:38:51.051596 kubelet[1451]: I0515 10:38:51.051542 1451 factory.go:221] Registration of the containerd container factory successfully May 15 10:38:51.062185 kubelet[1451]: I0515 10:38:51.062141 1451 cpu_manager.go:214] "Starting CPU manager" policy="none" May 15 10:38:51.062185 kubelet[1451]: I0515 10:38:51.062167 1451 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 15 10:38:51.062185 kubelet[1451]: I0515 10:38:51.062190 1451 state_mem.go:36] "Initialized new in-memory state store" May 15 10:38:51.143090 kubelet[1451]: I0515 10:38:51.142607 1451 kubelet_node_status.go:73] "Attempting to register node" node="10.0.0.55" May 15 10:38:51.387106 kubelet[1451]: I0515 10:38:51.385439 1451 kubelet_node_status.go:76] "Successfully registered node" node="10.0.0.55" May 15 10:38:51.387106 kubelet[1451]: I0515 10:38:51.385907 1451 policy_none.go:49] "None policy: Start" May 15 10:38:51.398166 kubelet[1451]: I0515 10:38:51.398122 1451 memory_manager.go:170] "Starting memorymanager" policy="None" May 15 10:38:51.398401 kubelet[1451]: I0515 10:38:51.398384 1451 state_mem.go:35] "Initializing new in-memory state store" May 15 10:38:51.399315 kubelet[1451]: I0515 10:38:51.399297 1451 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" May 15 10:38:51.399826 env[1202]: time="2025-05-15T10:38:51.399695490Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 15 10:38:51.400262 kubelet[1451]: I0515 10:38:51.400242 1451 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" May 15 10:38:51.437523 systemd[1]: Created slice kubepods.slice. May 15 10:38:51.450718 systemd[1]: Created slice kubepods-burstable.slice. May 15 10:38:51.456218 systemd[1]: Created slice kubepods-besteffort.slice. May 15 10:38:51.636000 audit[1451]: AVC avc: denied { mac_admin } for pid=1451 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:51.636000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:38:51.636000 audit[1451]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bfd2c0 a1=c000687fe0 a2=c000bfd290 a3=25 items=0 ppid=1 pid=1451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:51.636000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:38:51.643983 kubelet[1451]: I0515 10:38:51.637662 1451 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 15 10:38:51.643983 kubelet[1451]: I0515 10:38:51.637739 1451 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 15 10:38:51.643983 kubelet[1451]: I0515 10:38:51.637903 1451 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 15 10:38:51.643983 kubelet[1451]: I0515 10:38:51.638667 1451 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 15 10:38:51.671301 sudo[1331]: pam_unix(sudo:session): session closed for user root May 15 10:38:51.670000 audit[1331]: USER_END pid=1331 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:38:51.670000 audit[1331]: CRED_DISP pid=1331 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:38:51.679324 sshd[1328]: pam_unix(sshd:session): session closed for user core May 15 10:38:51.687000 audit[1328]: USER_END pid=1328 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:38:51.688000 audit[1328]: CRED_DISP pid=1328 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:38:51.692000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.55:22-10.0.0.1:55922 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:51.693296 systemd[1]: sshd@6-10.0.0.55:22-10.0.0.1:55922.service: Deactivated successfully. May 15 10:38:51.698933 systemd[1]: session-7.scope: Deactivated successfully. May 15 10:38:51.704096 systemd-logind[1193]: Session 7 logged out. Waiting for processes to exit. May 15 10:38:51.704000 audit[1468]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1468 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:51.704000 audit[1468]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdbcf98c80 a2=0 a3=7ffdbcf98c6c items=0 ppid=1451 pid=1468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:51.704000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 15 10:38:51.706442 systemd-logind[1193]: Removed session 7. May 15 10:38:51.707000 audit[1472]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1472 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:51.707000 audit[1472]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffca5365110 a2=0 a3=7ffca53650fc items=0 ppid=1451 pid=1472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:51.707000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 15 10:38:51.714000 audit[1474]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1474 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:51.714000 audit[1474]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc687ea3a0 a2=0 a3=7ffc687ea38c items=0 ppid=1451 pid=1474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:51.714000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 10:38:51.761000 audit[1479]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1479 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:51.761000 audit[1479]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe5a2df0f0 a2=0 a3=7ffe5a2df0dc items=0 ppid=1451 pid=1479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:51.761000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 10:38:51.914361 kubelet[1451]: I0515 10:38:51.913383 1451 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" May 15 10:38:51.914361 kubelet[1451]: W0515 10:38:51.913875 1451 reflector.go:470] k8s.io/client-go/informers/factory.go:160: watch of *v1.Service ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 15 10:38:51.915730 kubelet[1451]: W0515 10:38:51.914621 1451 reflector.go:470] k8s.io/client-go/informers/factory.go:160: watch of *v1.CSIDriver ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 15 10:38:51.977000 audit[1484]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1484 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:51.977000 audit[1484]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffeca4a5c40 a2=0 a3=7ffeca4a5c2c items=0 ppid=1451 pid=1484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:51.977000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 15 10:38:51.988081 kubelet[1451]: I0515 10:38:51.986872 1451 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 15 10:38:51.987000 audit[1485]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1485 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:51.987000 audit[1485]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe4f1da350 a2=0 a3=7ffe4f1da33c items=0 ppid=1451 pid=1485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:51.987000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 15 10:38:51.987000 audit[1486]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1486 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:51.987000 audit[1486]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffef5d5d9a0 a2=0 a3=10e3 items=0 ppid=1451 pid=1486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:51.987000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 15 10:38:51.988963 kubelet[1451]: I0515 10:38:51.988912 1451 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 15 10:38:51.988963 kubelet[1451]: I0515 10:38:51.988953 1451 status_manager.go:217] "Starting to sync pod status with apiserver" May 15 10:38:51.989043 kubelet[1451]: I0515 10:38:51.988979 1451 kubelet.go:2337] "Starting kubelet main sync loop" May 15 10:38:51.989043 kubelet[1451]: E0515 10:38:51.989036 1451 kubelet.go:2361] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" May 15 10:38:51.990000 audit[1487]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1487 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:51.990000 audit[1487]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffb7afe140 a2=0 a3=7fffb7afe12c items=0 ppid=1451 pid=1487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:51.990000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 15 10:38:51.991000 audit[1488]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=1488 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:51.991000 audit[1488]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffec80297b0 a2=0 a3=7ffec802979c items=0 ppid=1451 pid=1488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:51.991000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 15 10:38:51.991000 audit[1489]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=1489 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:51.991000 audit[1489]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffca965ab50 a2=0 a3=7ffca965ab3c items=0 ppid=1451 pid=1489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:51.991000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 15 10:38:51.996000 audit[1490]: NETFILTER_CFG table=filter:12 family=10 entries=2 op=nft_register_chain pid=1490 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:51.996000 audit[1490]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcb9da2c70 a2=0 a3=7ffcb9da2c5c items=0 ppid=1451 pid=1490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:51.996000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 15 10:38:51.996000 audit[1491]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_chain pid=1491 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:51.996000 audit[1491]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd9b079ed0 a2=0 a3=7ffd9b079ebc items=0 ppid=1451 pid=1491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:51.996000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 15 10:38:52.002741 kubelet[1451]: I0515 10:38:52.002353 1451 apiserver.go:52] "Watching apiserver" May 15 10:38:52.002741 kubelet[1451]: E0515 10:38:52.002407 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:38:52.089866 kubelet[1451]: I0515 10:38:52.089762 1451 topology_manager.go:215] "Topology Admit Handler" podUID="a96f0651-8968-4b81-993b-b6785afc2b65" podNamespace="calico-system" podName="calico-node-jcdjs" May 15 10:38:52.090072 kubelet[1451]: I0515 10:38:52.089987 1451 topology_manager.go:215] "Topology Admit Handler" podUID="cca26a38-64ea-47f2-8e19-11a1392a4fe2" podNamespace="calico-system" podName="csi-node-driver-hwpkv" May 15 10:38:52.090145 kubelet[1451]: I0515 10:38:52.090093 1451 topology_manager.go:215] "Topology Admit Handler" podUID="9c8cced6-8ada-4683-8e98-463025692d23" podNamespace="kube-system" podName="kube-proxy-2p556" May 15 10:38:52.090963 kubelet[1451]: E0515 10:38:52.090737 1451 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hwpkv" podUID="cca26a38-64ea-47f2-8e19-11a1392a4fe2" May 15 10:38:52.225096 systemd[1]: Created slice kubepods-besteffort-poda96f0651_8968_4b81_993b_b6785afc2b65.slice. May 15 10:38:52.228379 kubelet[1451]: I0515 10:38:52.228347 1451 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 15 10:38:52.243082 systemd[1]: Created slice kubepods-besteffort-pod9c8cced6_8ada_4683_8e98_463025692d23.slice. May 15 10:38:52.324144 kubelet[1451]: I0515 10:38:52.323373 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/a96f0651-8968-4b81-993b-b6785afc2b65-tigera-ca-bundle\") pod \"calico-node-jcdjs\" (UID: \"a96f0651-8968-4b81-993b-b6785afc2b65\") " pod="calico-system/calico-node-jcdjs" May 15 10:38:52.324144 kubelet[1451]: I0515 10:38:52.323434 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/cca26a38-64ea-47f2-8e19-11a1392a4fe2-socket-dir\") pod \"csi-node-driver-hwpkv\" (UID: \"cca26a38-64ea-47f2-8e19-11a1392a4fe2\") " pod="calico-system/csi-node-driver-hwpkv" May 15 10:38:52.324144 kubelet[1451]: I0515 10:38:52.323463 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/a96f0651-8968-4b81-993b-b6785afc2b65-policysync\") pod \"calico-node-jcdjs\" (UID: \"a96f0651-8968-4b81-993b-b6785afc2b65\") " pod="calico-system/calico-node-jcdjs" May 15 10:38:52.324144 kubelet[1451]: I0515 10:38:52.323488 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/a96f0651-8968-4b81-993b-b6785afc2b65-cni-net-dir\") pod \"calico-node-jcdjs\" (UID: \"a96f0651-8968-4b81-993b-b6785afc2b65\") " pod="calico-system/calico-node-jcdjs" May 15 10:38:52.324144 kubelet[1451]: I0515 10:38:52.323507 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/cca26a38-64ea-47f2-8e19-11a1392a4fe2-kubelet-dir\") pod \"csi-node-driver-hwpkv\" (UID: \"cca26a38-64ea-47f2-8e19-11a1392a4fe2\") " pod="calico-system/csi-node-driver-hwpkv" May 15 10:38:52.324455 kubelet[1451]: I0515 10:38:52.323525 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/9c8cced6-8ada-4683-8e98-463025692d23-kube-proxy\") pod \"kube-proxy-2p556\" (UID: \"9c8cced6-8ada-4683-8e98-463025692d23\") " pod="kube-system/kube-proxy-2p556" May 15 10:38:52.324455 kubelet[1451]: I0515 10:38:52.323541 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/9c8cced6-8ada-4683-8e98-463025692d23-xtables-lock\") pod \"kube-proxy-2p556\" (UID: \"9c8cced6-8ada-4683-8e98-463025692d23\") " pod="kube-system/kube-proxy-2p556" May 15 10:38:52.324455 kubelet[1451]: I0515 10:38:52.323558 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/9c8cced6-8ada-4683-8e98-463025692d23-lib-modules\") pod \"kube-proxy-2p556\" (UID: \"9c8cced6-8ada-4683-8e98-463025692d23\") " pod="kube-system/kube-proxy-2p556" May 15 10:38:52.324455 kubelet[1451]: I0515 10:38:52.323579 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/a96f0651-8968-4b81-993b-b6785afc2b65-xtables-lock\") pod \"calico-node-jcdjs\" (UID: \"a96f0651-8968-4b81-993b-b6785afc2b65\") " pod="calico-system/calico-node-jcdjs" May 15 10:38:52.324455 kubelet[1451]: I0515 10:38:52.323598 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/a96f0651-8968-4b81-993b-b6785afc2b65-node-certs\") pod \"calico-node-jcdjs\" (UID: \"a96f0651-8968-4b81-993b-b6785afc2b65\") " pod="calico-system/calico-node-jcdjs" May 15 10:38:52.324654 kubelet[1451]: I0515 10:38:52.323617 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/a96f0651-8968-4b81-993b-b6785afc2b65-var-run-calico\") pod \"calico-node-jcdjs\" (UID: \"a96f0651-8968-4b81-993b-b6785afc2b65\") " pod="calico-system/calico-node-jcdjs" May 15 10:38:52.324654 kubelet[1451]: I0515 10:38:52.323645 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mb2jp\" (UniqueName: \"kubernetes.io/projected/cca26a38-64ea-47f2-8e19-11a1392a4fe2-kube-api-access-mb2jp\") pod \"csi-node-driver-hwpkv\" (UID: \"cca26a38-64ea-47f2-8e19-11a1392a4fe2\") " pod="calico-system/csi-node-driver-hwpkv" May 15 10:38:52.324654 kubelet[1451]: I0515 10:38:52.323668 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4hxjz\" (UniqueName: \"kubernetes.io/projected/9c8cced6-8ada-4683-8e98-463025692d23-kube-api-access-4hxjz\") pod \"kube-proxy-2p556\" (UID: \"9c8cced6-8ada-4683-8e98-463025692d23\") " pod="kube-system/kube-proxy-2p556" May 15 10:38:52.324654 kubelet[1451]: I0515 10:38:52.323689 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/cca26a38-64ea-47f2-8e19-11a1392a4fe2-varrun\") pod \"csi-node-driver-hwpkv\" (UID: \"cca26a38-64ea-47f2-8e19-11a1392a4fe2\") " pod="calico-system/csi-node-driver-hwpkv" May 15 10:38:52.324654 kubelet[1451]: I0515 10:38:52.323707 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/cca26a38-64ea-47f2-8e19-11a1392a4fe2-registration-dir\") pod \"csi-node-driver-hwpkv\" (UID: \"cca26a38-64ea-47f2-8e19-11a1392a4fe2\") " pod="calico-system/csi-node-driver-hwpkv" May 15 10:38:52.324785 kubelet[1451]: I0515 10:38:52.323726 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/a96f0651-8968-4b81-993b-b6785afc2b65-lib-modules\") pod \"calico-node-jcdjs\" (UID: \"a96f0651-8968-4b81-993b-b6785afc2b65\") " pod="calico-system/calico-node-jcdjs" May 15 10:38:52.324785 kubelet[1451]: I0515 10:38:52.323745 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/a96f0651-8968-4b81-993b-b6785afc2b65-var-lib-calico\") pod \"calico-node-jcdjs\" (UID: \"a96f0651-8968-4b81-993b-b6785afc2b65\") " pod="calico-system/calico-node-jcdjs" May 15 10:38:52.324785 kubelet[1451]: I0515 10:38:52.323766 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/a96f0651-8968-4b81-993b-b6785afc2b65-cni-bin-dir\") pod \"calico-node-jcdjs\" (UID: \"a96f0651-8968-4b81-993b-b6785afc2b65\") " pod="calico-system/calico-node-jcdjs" May 15 10:38:52.324785 kubelet[1451]: I0515 10:38:52.323788 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/a96f0651-8968-4b81-993b-b6785afc2b65-cni-log-dir\") pod \"calico-node-jcdjs\" (UID: \"a96f0651-8968-4b81-993b-b6785afc2b65\") " pod="calico-system/calico-node-jcdjs" May 15 10:38:52.324785 kubelet[1451]: I0515 10:38:52.323807 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/a96f0651-8968-4b81-993b-b6785afc2b65-flexvol-driver-host\") pod \"calico-node-jcdjs\" (UID: \"a96f0651-8968-4b81-993b-b6785afc2b65\") " pod="calico-system/calico-node-jcdjs" May 15 10:38:52.324958 kubelet[1451]: I0515 10:38:52.323843 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wmd24\" (UniqueName: \"kubernetes.io/projected/a96f0651-8968-4b81-993b-b6785afc2b65-kube-api-access-wmd24\") pod \"calico-node-jcdjs\" (UID: \"a96f0651-8968-4b81-993b-b6785afc2b65\") " pod="calico-system/calico-node-jcdjs" May 15 10:38:52.425579 kubelet[1451]: E0515 10:38:52.425530 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.428833 kubelet[1451]: W0515 10:38:52.426026 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.428833 kubelet[1451]: E0515 10:38:52.428467 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.431272 kubelet[1451]: E0515 10:38:52.430291 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.431272 kubelet[1451]: W0515 10:38:52.430309 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.431272 kubelet[1451]: E0515 10:38:52.430329 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.431272 kubelet[1451]: E0515 10:38:52.430493 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.431272 kubelet[1451]: W0515 10:38:52.430500 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.431272 kubelet[1451]: E0515 10:38:52.430562 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.431272 kubelet[1451]: E0515 10:38:52.430639 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.431272 kubelet[1451]: W0515 10:38:52.430645 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.431272 kubelet[1451]: E0515 10:38:52.430708 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.431272 kubelet[1451]: E0515 10:38:52.430809 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.431582 kubelet[1451]: W0515 10:38:52.430826 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.431582 kubelet[1451]: E0515 10:38:52.430888 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.431582 kubelet[1451]: E0515 10:38:52.430974 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.431582 kubelet[1451]: W0515 10:38:52.430980 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.431582 kubelet[1451]: E0515 10:38:52.431058 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.431582 kubelet[1451]: E0515 10:38:52.431117 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.431582 kubelet[1451]: W0515 10:38:52.431125 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.431582 kubelet[1451]: E0515 10:38:52.431144 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.434942 kubelet[1451]: E0515 10:38:52.434898 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.434942 kubelet[1451]: W0515 10:38:52.434925 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.435244 kubelet[1451]: E0515 10:38:52.435158 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.435244 kubelet[1451]: E0515 10:38:52.435217 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.435244 kubelet[1451]: W0515 10:38:52.435228 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.435422 kubelet[1451]: E0515 10:38:52.435300 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.435671 kubelet[1451]: E0515 10:38:52.435616 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.435671 kubelet[1451]: W0515 10:38:52.435629 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.435825 kubelet[1451]: E0515 10:38:52.435787 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.436465 kubelet[1451]: E0515 10:38:52.436440 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.436465 kubelet[1451]: W0515 10:38:52.436459 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.436546 kubelet[1451]: E0515 10:38:52.436492 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.436712 kubelet[1451]: E0515 10:38:52.436691 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.436712 kubelet[1451]: W0515 10:38:52.436707 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.436837 kubelet[1451]: E0515 10:38:52.436791 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.436943 kubelet[1451]: E0515 10:38:52.436922 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.436943 kubelet[1451]: W0515 10:38:52.436937 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.437019 kubelet[1451]: E0515 10:38:52.436996 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.437108 kubelet[1451]: E0515 10:38:52.437087 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.437108 kubelet[1451]: W0515 10:38:52.437102 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.437181 kubelet[1451]: E0515 10:38:52.437163 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.437277 kubelet[1451]: E0515 10:38:52.437256 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.437277 kubelet[1451]: W0515 10:38:52.437270 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.437356 kubelet[1451]: E0515 10:38:52.437331 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.437675 kubelet[1451]: E0515 10:38:52.437429 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.437744 kubelet[1451]: W0515 10:38:52.437674 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.439649 kubelet[1451]: E0515 10:38:52.439617 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.448443 kubelet[1451]: E0515 10:38:52.447140 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.448443 kubelet[1451]: W0515 10:38:52.447167 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.448443 kubelet[1451]: E0515 10:38:52.447442 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.448443 kubelet[1451]: W0515 10:38:52.447450 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.448443 kubelet[1451]: E0515 10:38:52.447604 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.448443 kubelet[1451]: W0515 10:38:52.447613 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.448443 kubelet[1451]: E0515 10:38:52.447656 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.448443 kubelet[1451]: E0515 10:38:52.447733 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.448443 kubelet[1451]: E0515 10:38:52.447747 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.448443 kubelet[1451]: E0515 10:38:52.447762 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.448864 kubelet[1451]: W0515 10:38:52.447783 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.448864 kubelet[1451]: E0515 10:38:52.447938 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.448864 kubelet[1451]: E0515 10:38:52.448149 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.448864 kubelet[1451]: W0515 10:38:52.448162 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.448864 kubelet[1451]: E0515 10:38:52.448226 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.448864 kubelet[1451]: E0515 10:38:52.448330 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.448864 kubelet[1451]: W0515 10:38:52.448338 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.448864 kubelet[1451]: E0515 10:38:52.448450 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.448864 kubelet[1451]: W0515 10:38:52.448457 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.448864 kubelet[1451]: E0515 10:38:52.448558 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.449120 kubelet[1451]: W0515 10:38:52.448565 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.449120 kubelet[1451]: E0515 10:38:52.448677 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.449120 kubelet[1451]: W0515 10:38:52.448683 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.449120 kubelet[1451]: E0515 10:38:52.448999 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.449120 kubelet[1451]: W0515 10:38:52.449007 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.449120 kubelet[1451]: E0515 10:38:52.449114 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.449120 kubelet[1451]: W0515 10:38:52.449120 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.449287 kubelet[1451]: E0515 10:38:52.449223 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.449287 kubelet[1451]: W0515 10:38:52.449229 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.449539 kubelet[1451]: E0515 10:38:52.449330 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.449539 kubelet[1451]: W0515 10:38:52.449346 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.449539 kubelet[1451]: E0515 10:38:52.449448 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.449539 kubelet[1451]: W0515 10:38:52.449454 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.449680 kubelet[1451]: E0515 10:38:52.449556 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.449680 kubelet[1451]: W0515 10:38:52.449563 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.449680 kubelet[1451]: E0515 10:38:52.449677 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.449763 kubelet[1451]: W0515 10:38:52.449684 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.449763 kubelet[1451]: E0515 10:38:52.449728 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.449763 kubelet[1451]: E0515 10:38:52.449758 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.449908 kubelet[1451]: E0515 10:38:52.449775 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.449908 kubelet[1451]: E0515 10:38:52.449786 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.449908 kubelet[1451]: E0515 10:38:52.449787 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.449908 kubelet[1451]: E0515 10:38:52.449806 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.449908 kubelet[1451]: E0515 10:38:52.449858 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.449908 kubelet[1451]: E0515 10:38:52.449870 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.449908 kubelet[1451]: E0515 10:38:52.449876 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.449908 kubelet[1451]: E0515 10:38:52.449880 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.449908 kubelet[1451]: W0515 10:38:52.449885 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.449908 kubelet[1451]: E0515 10:38:52.449890 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.450167 kubelet[1451]: E0515 10:38:52.449943 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.450167 kubelet[1451]: E0515 10:38:52.449964 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.450167 kubelet[1451]: E0515 10:38:52.450023 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.450167 kubelet[1451]: W0515 10:38:52.450033 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.450167 kubelet[1451]: E0515 10:38:52.450088 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.450307 kubelet[1451]: E0515 10:38:52.450196 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.450307 kubelet[1451]: W0515 10:38:52.450205 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.450307 kubelet[1451]: E0515 10:38:52.450258 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.450385 kubelet[1451]: E0515 10:38:52.450356 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.450385 kubelet[1451]: W0515 10:38:52.450364 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.450444 kubelet[1451]: E0515 10:38:52.450434 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.452863 kubelet[1451]: E0515 10:38:52.450928 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.452863 kubelet[1451]: W0515 10:38:52.450964 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.452863 kubelet[1451]: E0515 10:38:52.451212 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.452863 kubelet[1451]: W0515 10:38:52.451220 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.452863 kubelet[1451]: E0515 10:38:52.452735 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.454836 kubelet[1451]: E0515 10:38:52.454794 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.455017 kubelet[1451]: E0515 10:38:52.454979 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.455017 kubelet[1451]: W0515 10:38:52.455003 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.455099 kubelet[1451]: E0515 10:38:52.455089 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.462723 kubelet[1451]: E0515 10:38:52.462649 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.462723 kubelet[1451]: W0515 10:38:52.462694 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.463021 kubelet[1451]: E0515 10:38:52.462821 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.463158 kubelet[1451]: E0515 10:38:52.463124 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.463215 kubelet[1451]: W0515 10:38:52.463150 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.465151 kubelet[1451]: E0515 10:38:52.463290 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.465151 kubelet[1451]: E0515 10:38:52.463522 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.467861 kubelet[1451]: W0515 10:38:52.466590 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.469631 kubelet[1451]: E0515 10:38:52.469330 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.469702 kubelet[1451]: E0515 10:38:52.469587 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.469702 kubelet[1451]: W0515 10:38:52.469674 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.469984 kubelet[1451]: E0515 10:38:52.469904 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.476742 kubelet[1451]: E0515 10:38:52.476680 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.476742 kubelet[1451]: W0515 10:38:52.476718 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.477258 kubelet[1451]: E0515 10:38:52.477109 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.481222 kubelet[1451]: E0515 10:38:52.480767 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.481222 kubelet[1451]: W0515 10:38:52.480803 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.481222 kubelet[1451]: E0515 10:38:52.480923 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.481469 kubelet[1451]: E0515 10:38:52.481312 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.481469 kubelet[1451]: W0515 10:38:52.481324 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.481531 kubelet[1451]: E0515 10:38:52.481488 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.481531 kubelet[1451]: W0515 10:38:52.481496 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.481632 kubelet[1451]: E0515 10:38:52.481610 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.481777 kubelet[1451]: E0515 10:38:52.481666 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.481777 kubelet[1451]: W0515 10:38:52.481739 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.482002 kubelet[1451]: E0515 10:38:52.481678 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.482624 kubelet[1451]: E0515 10:38:52.482018 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.482678 kubelet[1451]: W0515 10:38:52.482642 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.482737 kubelet[1451]: E0515 10:38:52.482026 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.482797 kubelet[1451]: E0515 10:38:52.482765 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.483322 kubelet[1451]: E0515 10:38:52.482945 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.483322 kubelet[1451]: W0515 10:38:52.482962 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.483322 kubelet[1451]: E0515 10:38:52.483026 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.483322 kubelet[1451]: E0515 10:38:52.483220 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.483322 kubelet[1451]: W0515 10:38:52.483236 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.484172 kubelet[1451]: E0515 10:38:52.484150 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.484339 kubelet[1451]: E0515 10:38:52.484324 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.484449 kubelet[1451]: W0515 10:38:52.484417 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.484652 kubelet[1451]: E0515 10:38:52.484634 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.486174 kubelet[1451]: E0515 10:38:52.486160 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.486260 kubelet[1451]: W0515 10:38:52.486242 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.487514 kubelet[1451]: E0515 10:38:52.487489 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.488075 kubelet[1451]: E0515 10:38:52.488018 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.488075 kubelet[1451]: W0515 10:38:52.488042 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.488204 kubelet[1451]: E0515 10:38:52.488184 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.488415 kubelet[1451]: E0515 10:38:52.488251 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.488415 kubelet[1451]: W0515 10:38:52.488406 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.488612 kubelet[1451]: E0515 10:38:52.488590 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.488612 kubelet[1451]: W0515 10:38:52.488604 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.489566 kubelet[1451]: E0515 10:38:52.488802 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.489566 kubelet[1451]: W0515 10:38:52.488906 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.489566 kubelet[1451]: E0515 10:38:52.489062 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.489566 kubelet[1451]: W0515 10:38:52.489070 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.489566 kubelet[1451]: E0515 10:38:52.488834 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.489566 kubelet[1451]: E0515 10:38:52.488806 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.491631 kubelet[1451]: E0515 10:38:52.490049 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.491631 kubelet[1451]: E0515 10:38:52.490085 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.492949 kubelet[1451]: E0515 10:38:52.492914 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.492949 kubelet[1451]: W0515 10:38:52.492936 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.493097 kubelet[1451]: E0515 10:38:52.493075 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.493234 kubelet[1451]: E0515 10:38:52.493219 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.493282 kubelet[1451]: W0515 10:38:52.493236 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.493413 kubelet[1451]: E0515 10:38:52.493350 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.493785 kubelet[1451]: E0515 10:38:52.493771 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.493785 kubelet[1451]: W0515 10:38:52.493783 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.493999 kubelet[1451]: E0515 10:38:52.493882 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.495561 kubelet[1451]: E0515 10:38:52.495517 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.495561 kubelet[1451]: W0515 10:38:52.495534 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.495746 kubelet[1451]: E0515 10:38:52.495605 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.495746 kubelet[1451]: E0515 10:38:52.495745 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.495805 kubelet[1451]: W0515 10:38:52.495754 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.495898 kubelet[1451]: E0515 10:38:52.495879 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.496125 kubelet[1451]: E0515 10:38:52.496083 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.496125 kubelet[1451]: W0515 10:38:52.496114 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.496204 kubelet[1451]: E0515 10:38:52.496143 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.510767 kubelet[1451]: E0515 10:38:52.510710 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.510767 kubelet[1451]: W0515 10:38:52.510750 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.510767 kubelet[1451]: E0515 10:38:52.510774 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.514829 kubelet[1451]: E0515 10:38:52.514782 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:52.515020 kubelet[1451]: W0515 10:38:52.515001 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:52.515133 kubelet[1451]: E0515 10:38:52.515116 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:52.539223 kubelet[1451]: E0515 10:38:52.539180 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:52.547074 env[1202]: time="2025-05-15T10:38:52.541340167Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-jcdjs,Uid:a96f0651-8968-4b81-993b-b6785afc2b65,Namespace:calico-system,Attempt:0,}" May 15 10:38:52.553598 kubelet[1451]: E0515 10:38:52.553139 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:52.555312 env[1202]: time="2025-05-15T10:38:52.554415219Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-2p556,Uid:9c8cced6-8ada-4683-8e98-463025692d23,Namespace:kube-system,Attempt:0,}" May 15 10:38:53.003207 kubelet[1451]: E0515 10:38:53.003137 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:38:53.555053 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount283090454.mount: Deactivated successfully. May 15 10:38:53.612317 env[1202]: time="2025-05-15T10:38:53.612180648Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:53.623720 env[1202]: time="2025-05-15T10:38:53.623638668Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:53.628834 env[1202]: time="2025-05-15T10:38:53.625977858Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:53.630577 env[1202]: time="2025-05-15T10:38:53.630448125Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:53.634095 env[1202]: time="2025-05-15T10:38:53.633801545Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:53.636502 env[1202]: time="2025-05-15T10:38:53.636437995Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:53.648850 env[1202]: time="2025-05-15T10:38:53.645769560Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:53.649631 env[1202]: time="2025-05-15T10:38:53.649568801Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:53.755801 env[1202]: time="2025-05-15T10:38:53.755691407Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:38:53.756024 env[1202]: time="2025-05-15T10:38:53.755802271Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:38:53.756024 env[1202]: time="2025-05-15T10:38:53.755856185Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:38:53.756319 env[1202]: time="2025-05-15T10:38:53.756217081Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dd2f81b03e9a258ea9fe0660c76b807f37bd71522d23d1cdee5d0b81112be3ed pid=1578 runtime=io.containerd.runc.v2 May 15 10:38:53.764354 env[1202]: time="2025-05-15T10:38:53.764226855Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:38:53.764354 env[1202]: time="2025-05-15T10:38:53.764337311Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:38:53.764574 env[1202]: time="2025-05-15T10:38:53.764370274Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:38:53.764574 env[1202]: time="2025-05-15T10:38:53.764517649Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/317fd064cb251d4a6536a47341fc7dbe52c40f9ce9bdaf895d70d8443e4d6887 pid=1581 runtime=io.containerd.runc.v2 May 15 10:38:53.832361 systemd[1]: Started cri-containerd-dd2f81b03e9a258ea9fe0660c76b807f37bd71522d23d1cdee5d0b81112be3ed.scope. May 15 10:38:53.836872 systemd[1]: Started cri-containerd-317fd064cb251d4a6536a47341fc7dbe52c40f9ce9bdaf895d70d8443e4d6887.scope. May 15 10:38:53.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.973597 kernel: kauditd_printk_skb: 243 callbacks suppressed May 15 10:38:53.973663 kernel: audit: type=1400 audit(1747305533.971:402): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.981840 kernel: audit: type=1400 audit(1747305533.971:403): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.985517 kernel: audit: type=1400 audit(1747305533.971:404): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.989842 kernel: audit: type=1400 audit(1747305533.971:405): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.989917 kernel: audit: type=1400 audit(1747305533.971:406): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.991491 kubelet[1451]: E0515 10:38:53.991060 1451 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hwpkv" podUID="cca26a38-64ea-47f2-8e19-11a1392a4fe2" May 15 10:38:53.995168 kernel: audit: type=1400 audit(1747305533.971:407): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.002132 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 15 10:38:54.002269 kernel: audit: type=1400 audit(1747305533.971:408): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.003192 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 May 15 10:38:54.003243 kernel: audit: backlog limit exceeded May 15 10:38:54.003389 kubelet[1451]: E0515 10:38:54.003336 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:38:53.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.978000 audit: BPF prog-id=58 op=LOAD May 15 10:38:53.978000 audit[1589]: AVC avc: denied { bpf } for pid=1589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.978000 audit[1589]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1578 pid=1589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:53.978000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464326638316230336539613235386561396665303636306337366238 May 15 10:38:53.978000 audit[1589]: AVC avc: denied { perfmon } for pid=1589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.978000 audit[1589]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1578 pid=1589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:53.978000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464326638316230336539613235386561396665303636306337366238 May 15 10:38:53.978000 audit[1589]: AVC avc: denied { bpf } for pid=1589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.978000 audit[1589]: AVC avc: denied { bpf } for pid=1589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.978000 audit[1589]: AVC avc: denied { bpf } for pid=1589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.978000 audit[1589]: AVC avc: denied { perfmon } for pid=1589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.978000 audit[1589]: AVC avc: denied { perfmon } for pid=1589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.978000 audit[1589]: AVC avc: denied { perfmon } for pid=1589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.978000 audit[1589]: AVC avc: denied { perfmon } for pid=1589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.978000 audit[1589]: AVC avc: denied { perfmon } for pid=1589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.978000 audit[1589]: AVC avc: denied { bpf } for pid=1589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.978000 audit[1589]: AVC avc: denied { bpf } for pid=1589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.978000 audit: BPF prog-id=59 op=LOAD May 15 10:38:53.978000 audit[1589]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0000251d0 items=0 ppid=1578 pid=1589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:53.978000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464326638316230336539613235386561396665303636306337366238 May 15 10:38:53.985000 audit[1589]: AVC avc: denied { bpf } for pid=1589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.985000 audit[1589]: AVC avc: denied { bpf } for pid=1589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.985000 audit[1589]: AVC avc: denied { perfmon } for pid=1589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.985000 audit[1589]: AVC avc: denied { perfmon } for pid=1589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.985000 audit[1589]: AVC avc: denied { perfmon } for pid=1589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.985000 audit[1589]: AVC avc: denied { perfmon } for pid=1589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.985000 audit[1589]: AVC avc: denied { perfmon } for pid=1589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.985000 audit[1589]: AVC avc: denied { bpf } for pid=1589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.989000 audit: BPF prog-id=60 op=LOAD May 15 10:38:53.989000 audit[1598]: AVC avc: denied { bpf } for pid=1598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.989000 audit[1598]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1581 pid=1598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:53.989000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331376664303634636232353164346136353336613437333431666337 May 15 10:38:53.989000 audit[1598]: AVC avc: denied { perfmon } for pid=1598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.989000 audit[1598]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1581 pid=1598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:53.989000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331376664303634636232353164346136353336613437333431666337 May 15 10:38:53.989000 audit[1598]: AVC avc: denied { bpf } for pid=1598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.989000 audit[1598]: AVC avc: denied { bpf } for pid=1598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.989000 audit[1598]: AVC avc: denied { bpf } for pid=1598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.989000 audit[1598]: AVC avc: denied { perfmon } for pid=1598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.989000 audit[1598]: AVC avc: denied { perfmon } for pid=1598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.989000 audit[1598]: AVC avc: denied { perfmon } for pid=1598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.989000 audit[1598]: AVC avc: denied { perfmon } for pid=1598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.989000 audit[1598]: AVC avc: denied { perfmon } for pid=1598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.989000 audit[1598]: AVC avc: denied { bpf } for pid=1598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.985000 audit[1589]: AVC avc: denied { bpf } for pid=1589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.985000 audit: BPF prog-id=61 op=LOAD May 15 10:38:53.989000 audit[1598]: AVC avc: denied { bpf } for pid=1598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:53.985000 audit[1589]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000025218 items=0 ppid=1578 pid=1589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:53.989000 audit[1598]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000236240 items=0 ppid=1581 pid=1598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:53.989000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331376664303634636232353164346136353336613437333431666337 May 15 10:38:53.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464326638316230336539613235386561396665303636306337366238 May 15 10:38:54.007000 audit: BPF prog-id=61 op=UNLOAD May 15 10:38:54.007000 audit: BPF prog-id=59 op=UNLOAD May 15 10:38:54.007000 audit[1598]: AVC avc: denied { bpf } for pid=1598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.007000 audit[1598]: AVC avc: denied { bpf } for pid=1598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.007000 audit[1598]: AVC avc: denied { perfmon } for pid=1598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.007000 audit[1598]: AVC avc: denied { perfmon } for pid=1598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.007000 audit[1598]: AVC avc: denied { perfmon } for pid=1598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.007000 audit[1598]: AVC avc: denied { perfmon } for pid=1598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.007000 audit[1598]: AVC avc: denied { perfmon } for pid=1598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.007000 audit[1598]: AVC avc: denied { bpf } for pid=1598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.007000 audit[1589]: AVC avc: denied { bpf } for pid=1589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.007000 audit[1589]: AVC avc: denied { bpf } for pid=1589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.007000 audit[1589]: AVC avc: denied { bpf } for pid=1589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.007000 audit[1589]: AVC avc: denied { perfmon } for pid=1589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.007000 audit[1589]: AVC avc: denied { perfmon } for pid=1589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.007000 audit[1589]: AVC avc: denied { perfmon } for pid=1589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.007000 audit[1589]: AVC avc: denied { perfmon } for pid=1589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.007000 audit[1589]: AVC avc: denied { perfmon } for pid=1589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.007000 audit[1589]: AVC avc: denied { bpf } for pid=1589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.007000 audit[1598]: AVC avc: denied { bpf } for pid=1598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.007000 audit: BPF prog-id=63 op=LOAD May 15 10:38:54.007000 audit[1598]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000236288 items=0 ppid=1581 pid=1598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:54.007000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331376664303634636232353164346136353336613437333431666337 May 15 10:38:54.007000 audit: BPF prog-id=63 op=UNLOAD May 15 10:38:54.007000 audit: BPF prog-id=62 op=UNLOAD May 15 10:38:54.007000 audit[1598]: AVC avc: denied { bpf } for pid=1598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.007000 audit[1598]: AVC avc: denied { bpf } for pid=1598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.007000 audit[1598]: AVC avc: denied { bpf } for pid=1598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.007000 audit[1598]: AVC avc: denied { perfmon } for pid=1598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.007000 audit[1598]: AVC avc: denied { perfmon } for pid=1598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.007000 audit[1598]: AVC avc: denied { perfmon } for pid=1598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.007000 audit[1598]: AVC avc: denied { perfmon } for pid=1598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.007000 audit[1598]: AVC avc: denied { perfmon } for pid=1598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.007000 audit[1598]: AVC avc: denied { bpf } for pid=1598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.007000 audit[1589]: AVC avc: denied { bpf } for pid=1589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.007000 audit: BPF prog-id=64 op=LOAD May 15 10:38:54.007000 audit[1589]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025628 items=0 ppid=1578 pid=1589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:54.007000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464326638316230336539613235386561396665303636306337366238 May 15 10:38:54.007000 audit[1598]: AVC avc: denied { bpf } for pid=1598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.007000 audit: BPF prog-id=65 op=LOAD May 15 10:38:54.007000 audit[1598]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000236698 items=0 ppid=1581 pid=1598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:54.007000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331376664303634636232353164346136353336613437333431666337 May 15 10:38:54.122765 env[1202]: time="2025-05-15T10:38:54.122599597Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-jcdjs,Uid:a96f0651-8968-4b81-993b-b6785afc2b65,Namespace:calico-system,Attempt:0,} returns sandbox id \"317fd064cb251d4a6536a47341fc7dbe52c40f9ce9bdaf895d70d8443e4d6887\"" May 15 10:38:54.125396 env[1202]: time="2025-05-15T10:38:54.123277335Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-2p556,Uid:9c8cced6-8ada-4683-8e98-463025692d23,Namespace:kube-system,Attempt:0,} returns sandbox id \"dd2f81b03e9a258ea9fe0660c76b807f37bd71522d23d1cdee5d0b81112be3ed\"" May 15 10:38:54.125490 kubelet[1451]: E0515 10:38:54.123909 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:54.127472 kubelet[1451]: E0515 10:38:54.127401 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:54.127930 env[1202]: time="2025-05-15T10:38:54.127696060Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 15 10:38:55.003890 kubelet[1451]: E0515 10:38:55.003594 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:38:55.990377 kubelet[1451]: E0515 10:38:55.990305 1451 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hwpkv" podUID="cca26a38-64ea-47f2-8e19-11a1392a4fe2" May 15 10:38:56.004840 kubelet[1451]: E0515 10:38:56.004704 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:38:56.546180 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2175883195.mount: Deactivated successfully. May 15 10:38:56.766267 env[1202]: time="2025-05-15T10:38:56.766182644Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:56.772741 env[1202]: time="2025-05-15T10:38:56.771778482Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:56.775534 env[1202]: time="2025-05-15T10:38:56.775460749Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:56.783251 env[1202]: time="2025-05-15T10:38:56.783184584Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:56.783551 env[1202]: time="2025-05-15T10:38:56.783511649Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5\"" May 15 10:38:56.787518 env[1202]: time="2025-05-15T10:38:56.787205982Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.12\"" May 15 10:38:56.788537 env[1202]: time="2025-05-15T10:38:56.788504189Z" level=info msg="CreateContainer within sandbox \"317fd064cb251d4a6536a47341fc7dbe52c40f9ce9bdaf895d70d8443e4d6887\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 15 10:38:56.836740 env[1202]: time="2025-05-15T10:38:56.836379812Z" level=info msg="CreateContainer within sandbox \"317fd064cb251d4a6536a47341fc7dbe52c40f9ce9bdaf895d70d8443e4d6887\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"90a7b727c0312e880119abc17fc0084a2d47237ee9cc7f795ed9a41f8963a327\"" May 15 10:38:56.846077 env[1202]: time="2025-05-15T10:38:56.844128109Z" level=info msg="StartContainer for \"90a7b727c0312e880119abc17fc0084a2d47237ee9cc7f795ed9a41f8963a327\"" May 15 10:38:56.900624 systemd[1]: Started cri-containerd-90a7b727c0312e880119abc17fc0084a2d47237ee9cc7f795ed9a41f8963a327.scope. May 15 10:38:56.941000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:56.941000 audit[1652]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7fd98d60cff8 items=0 ppid=1581 pid=1652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:56.941000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930613762373237633033313265383830313139616263313766633030 May 15 10:38:56.941000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:56.941000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:56.941000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:56.941000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:56.941000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:56.941000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:56.941000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:56.941000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:56.941000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:56.941000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:56.941000 audit: BPF prog-id=66 op=LOAD May 15 10:38:56.941000 audit[1652]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c000313ea8 items=0 ppid=1581 pid=1652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:56.941000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930613762373237633033313265383830313139616263313766633030 May 15 10:38:56.944000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:56.944000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:56.944000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:56.944000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:56.944000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:56.944000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:56.944000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:56.944000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:56.944000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:56.944000 audit: BPF prog-id=67 op=LOAD May 15 10:38:56.944000 audit[1652]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c000313ef8 items=0 ppid=1581 pid=1652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:56.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930613762373237633033313265383830313139616263313766633030 May 15 10:38:56.945000 audit: BPF prog-id=67 op=UNLOAD May 15 10:38:56.945000 audit: BPF prog-id=66 op=UNLOAD May 15 10:38:56.945000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:56.945000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:56.945000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:56.945000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:56.945000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:56.945000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:56.945000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:56.945000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:56.945000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:56.945000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:56.945000 audit: BPF prog-id=68 op=LOAD May 15 10:38:56.945000 audit[1652]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c000313f88 items=0 ppid=1581 pid=1652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:56.945000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930613762373237633033313265383830313139616263313766633030 May 15 10:38:57.010341 kubelet[1451]: E0515 10:38:57.009166 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:38:57.020663 env[1202]: time="2025-05-15T10:38:57.020589273Z" level=info msg="StartContainer for \"90a7b727c0312e880119abc17fc0084a2d47237ee9cc7f795ed9a41f8963a327\" returns successfully" May 15 10:38:57.021615 systemd[1]: cri-containerd-90a7b727c0312e880119abc17fc0084a2d47237ee9cc7f795ed9a41f8963a327.scope: Deactivated successfully. May 15 10:38:57.031684 kubelet[1451]: E0515 10:38:57.031408 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:57.031000 audit: BPF prog-id=68 op=UNLOAD May 15 10:38:57.389042 env[1202]: time="2025-05-15T10:38:57.385389358Z" level=info msg="shim disconnected" id=90a7b727c0312e880119abc17fc0084a2d47237ee9cc7f795ed9a41f8963a327 May 15 10:38:57.389042 env[1202]: time="2025-05-15T10:38:57.385444227Z" level=warning msg="cleaning up after shim disconnected" id=90a7b727c0312e880119abc17fc0084a2d47237ee9cc7f795ed9a41f8963a327 namespace=k8s.io May 15 10:38:57.389042 env[1202]: time="2025-05-15T10:38:57.385455201Z" level=info msg="cleaning up dead shim" May 15 10:38:57.403630 env[1202]: time="2025-05-15T10:38:57.403557842Z" level=warning msg="cleanup warnings time=\"2025-05-15T10:38:57Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1698 runtime=io.containerd.runc.v2\n" May 15 10:38:57.459273 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-90a7b727c0312e880119abc17fc0084a2d47237ee9cc7f795ed9a41f8963a327-rootfs.mount: Deactivated successfully. May 15 10:38:57.991790 kubelet[1451]: E0515 10:38:57.991346 1451 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hwpkv" podUID="cca26a38-64ea-47f2-8e19-11a1392a4fe2" May 15 10:38:58.013994 kubelet[1451]: E0515 10:38:58.013758 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:38:58.043899 kubelet[1451]: E0515 10:38:58.043162 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:59.015360 kubelet[1451]: E0515 10:38:59.015300 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:38:59.997409 kubelet[1451]: E0515 10:38:59.995527 1451 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hwpkv" podUID="cca26a38-64ea-47f2-8e19-11a1392a4fe2" May 15 10:39:00.015842 kubelet[1451]: E0515 10:39:00.015738 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:00.033637 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3076040029.mount: Deactivated successfully. May 15 10:39:01.016426 kubelet[1451]: E0515 10:39:01.016364 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:01.728686 env[1202]: time="2025-05-15T10:39:01.728011567Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:01.746261 env[1202]: time="2025-05-15T10:39:01.745549459Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c9356fea5d151501039907c3ba870272461396117eabc74063632616f4e31b2b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:01.748838 env[1202]: time="2025-05-15T10:39:01.748760524Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:01.752196 env[1202]: time="2025-05-15T10:39:01.752123198Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:ea8c7d5392acf6b0c11ebba78301e1a6c2dc6abcd7544102ed578e49d1c82f15,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:01.752736 env[1202]: time="2025-05-15T10:39:01.752477540Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.12\" returns image reference \"sha256:c9356fea5d151501039907c3ba870272461396117eabc74063632616f4e31b2b\"" May 15 10:39:01.754734 env[1202]: time="2025-05-15T10:39:01.754677017Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 15 10:39:01.757113 env[1202]: time="2025-05-15T10:39:01.757020241Z" level=info msg="CreateContainer within sandbox \"dd2f81b03e9a258ea9fe0660c76b807f37bd71522d23d1cdee5d0b81112be3ed\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 15 10:39:01.799017 env[1202]: time="2025-05-15T10:39:01.798949393Z" level=info msg="CreateContainer within sandbox \"dd2f81b03e9a258ea9fe0660c76b807f37bd71522d23d1cdee5d0b81112be3ed\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"f8f59605dfe3fb6c9028e7c454b107f41bfd4906925c57990418c4adf4f861e9\"" May 15 10:39:01.801101 env[1202]: time="2025-05-15T10:39:01.800948345Z" level=info msg="StartContainer for \"f8f59605dfe3fb6c9028e7c454b107f41bfd4906925c57990418c4adf4f861e9\"" May 15 10:39:01.865934 systemd[1]: run-containerd-runc-k8s.io-f8f59605dfe3fb6c9028e7c454b107f41bfd4906925c57990418c4adf4f861e9-runc.4VBWjY.mount: Deactivated successfully. May 15 10:39:01.919652 systemd[1]: Started cri-containerd-f8f59605dfe3fb6c9028e7c454b107f41bfd4906925c57990418c4adf4f861e9.scope. May 15 10:39:01.956000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:01.959379 kernel: kauditd_printk_skb: 150 callbacks suppressed May 15 10:39:01.959445 kernel: audit: type=1400 audit(1747305541.956:445): avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:01.956000 audit[1719]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f237afa11b8 items=0 ppid=1578 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:01.969989 kernel: audit: type=1300 audit(1747305541.956:445): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f237afa11b8 items=0 ppid=1578 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:01.970125 kernel: audit: type=1327 audit(1747305541.956:445): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638663539363035646665336662366339303238653763343534623130 May 15 10:39:01.956000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638663539363035646665336662366339303238653763343534623130 May 15 10:39:01.956000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:01.975388 kernel: audit: type=1400 audit(1747305541.956:446): avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:01.975451 kernel: audit: type=1400 audit(1747305541.956:446): avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:01.956000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:01.956000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:01.982510 kernel: audit: type=1400 audit(1747305541.956:446): avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:01.982896 kernel: audit: type=1400 audit(1747305541.956:446): avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:01.956000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:01.956000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:01.988625 kernel: audit: type=1400 audit(1747305541.956:446): avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:01.956000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:01.990415 kubelet[1451]: E0515 10:39:01.990368 1451 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hwpkv" podUID="cca26a38-64ea-47f2-8e19-11a1392a4fe2" May 15 10:39:01.992328 kernel: audit: type=1400 audit(1747305541.956:446): avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:01.992419 kernel: audit: type=1400 audit(1747305541.956:446): avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:01.956000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:01.956000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:01.956000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:01.956000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:01.956000 audit: BPF prog-id=69 op=LOAD May 15 10:39:01.956000 audit[1719]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00034a088 items=0 ppid=1578 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:01.956000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638663539363035646665336662366339303238653763343534623130 May 15 10:39:01.960000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:01.960000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:01.960000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:01.960000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:01.960000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:01.960000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:01.960000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:01.960000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:01.960000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:01.960000 audit: BPF prog-id=70 op=LOAD May 15 10:39:01.960000 audit[1719]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00034a0d8 items=0 ppid=1578 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:01.960000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638663539363035646665336662366339303238653763343534623130 May 15 10:39:01.970000 audit: BPF prog-id=70 op=UNLOAD May 15 10:39:01.970000 audit: BPF prog-id=69 op=UNLOAD May 15 10:39:01.970000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:01.970000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:01.970000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:01.970000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:01.970000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:01.970000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:01.970000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:01.970000 audit[1719]: AVC avc: denied { perfmon } for pid=1719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:01.970000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:01.970000 audit[1719]: AVC avc: denied { bpf } for pid=1719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:01.970000 audit: BPF prog-id=71 op=LOAD May 15 10:39:01.970000 audit[1719]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00034a168 items=0 ppid=1578 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:01.970000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638663539363035646665336662366339303238653763343534623130 May 15 10:39:02.018393 kubelet[1451]: E0515 10:39:02.018331 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:02.079564 env[1202]: time="2025-05-15T10:39:02.079424375Z" level=info msg="StartContainer for \"f8f59605dfe3fb6c9028e7c454b107f41bfd4906925c57990418c4adf4f861e9\" returns successfully" May 15 10:39:02.095000 audit[1771]: NETFILTER_CFG table=mangle:14 family=10 entries=1 op=nft_register_chain pid=1771 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:39:02.095000 audit[1771]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc42a0e180 a2=0 a3=7ffc42a0e16c items=0 ppid=1729 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.095000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 15 10:39:02.095000 audit[1772]: NETFILTER_CFG table=mangle:15 family=2 entries=1 op=nft_register_chain pid=1772 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:02.095000 audit[1772]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffec3079360 a2=0 a3=7ffec307934c items=0 ppid=1729 pid=1772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.095000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 15 10:39:02.096000 audit[1773]: NETFILTER_CFG table=nat:16 family=10 entries=1 op=nft_register_chain pid=1773 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:39:02.096000 audit[1773]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffff2b41a10 a2=0 a3=7ffff2b419fc items=0 ppid=1729 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.096000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 15 10:39:02.096000 audit[1775]: NETFILTER_CFG table=filter:17 family=10 entries=1 op=nft_register_chain pid=1775 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:39:02.096000 audit[1775]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffefa779e40 a2=0 a3=7ffefa779e2c items=0 ppid=1729 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.096000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 15 10:39:02.097000 audit[1774]: NETFILTER_CFG table=nat:18 family=2 entries=1 op=nft_register_chain pid=1774 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:02.097000 audit[1774]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffe6e38f50 a2=0 a3=7fffe6e38f3c items=0 ppid=1729 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.097000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 15 10:39:02.099000 audit[1776]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=1776 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:02.099000 audit[1776]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff82f64670 a2=0 a3=7fff82f6465c items=0 ppid=1729 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.099000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 15 10:39:02.198000 audit[1777]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1777 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:02.198000 audit[1777]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffea362c470 a2=0 a3=7ffea362c45c items=0 ppid=1729 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.198000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 15 10:39:02.201000 audit[1779]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1779 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:02.201000 audit[1779]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc88259e20 a2=0 a3=7ffc88259e0c items=0 ppid=1729 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.201000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 15 10:39:02.204000 audit[1782]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1782 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:02.204000 audit[1782]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd4ebad9d0 a2=0 a3=7ffd4ebad9bc items=0 ppid=1729 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.204000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 15 10:39:02.205000 audit[1783]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1783 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:02.205000 audit[1783]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcb592fac0 a2=0 a3=7ffcb592faac items=0 ppid=1729 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.205000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 15 10:39:02.209000 audit[1785]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1785 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:02.209000 audit[1785]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd6d6358b0 a2=0 a3=7ffd6d63589c items=0 ppid=1729 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.209000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 15 10:39:02.210000 audit[1786]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1786 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:02.210000 audit[1786]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc132b73b0 a2=0 a3=7ffc132b739c items=0 ppid=1729 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.210000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 15 10:39:02.212000 audit[1788]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1788 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:02.212000 audit[1788]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff8dab1440 a2=0 a3=7fff8dab142c items=0 ppid=1729 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.212000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 15 10:39:02.215000 audit[1791]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1791 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:02.215000 audit[1791]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc0dd9b2d0 a2=0 a3=7ffc0dd9b2bc items=0 ppid=1729 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.215000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 15 10:39:02.215000 audit[1792]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1792 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:02.215000 audit[1792]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffddc3cf630 a2=0 a3=7ffddc3cf61c items=0 ppid=1729 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.215000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 15 10:39:02.217000 audit[1794]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1794 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:02.217000 audit[1794]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff1debc5c0 a2=0 a3=7fff1debc5ac items=0 ppid=1729 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.217000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 15 10:39:02.218000 audit[1795]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1795 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:02.218000 audit[1795]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdbf10d5e0 a2=0 a3=7ffdbf10d5cc items=0 ppid=1729 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.218000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 15 10:39:02.220000 audit[1797]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1797 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:02.220000 audit[1797]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc16341670 a2=0 a3=7ffc1634165c items=0 ppid=1729 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.220000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 10:39:02.224000 audit[1800]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1800 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:02.224000 audit[1800]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc57295440 a2=0 a3=7ffc5729542c items=0 ppid=1729 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.224000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 10:39:02.226000 audit[1803]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1803 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:02.226000 audit[1803]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc790a9fe0 a2=0 a3=7ffc790a9fcc items=0 ppid=1729 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.226000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 15 10:39:02.227000 audit[1804]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1804 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:02.227000 audit[1804]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff012c3080 a2=0 a3=7fff012c306c items=0 ppid=1729 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.227000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 15 10:39:02.229000 audit[1806]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1806 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:02.229000 audit[1806]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd0c9f11d0 a2=0 a3=7ffd0c9f11bc items=0 ppid=1729 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.229000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 10:39:02.255000 audit[1811]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1811 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:02.255000 audit[1811]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe65445920 a2=0 a3=7ffe6544590c items=0 ppid=1729 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.255000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 10:39:02.256000 audit[1812]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1812 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:02.256000 audit[1812]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd253de590 a2=0 a3=7ffd253de57c items=0 ppid=1729 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.256000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 15 10:39:02.259000 audit[1814]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1814 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:02.259000 audit[1814]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffdf78061a0 a2=0 a3=7ffdf780618c items=0 ppid=1729 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.259000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 15 10:39:02.318000 audit[1820]: NETFILTER_CFG table=filter:39 family=2 entries=10 op=nft_register_rule pid=1820 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:02.318000 audit[1820]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7ffdffabc500 a2=0 a3=7ffdffabc4ec items=0 ppid=1729 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.318000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:02.350000 audit[1820]: NETFILTER_CFG table=nat:40 family=2 entries=14 op=nft_register_chain pid=1820 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:02.350000 audit[1820]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffdffabc500 a2=0 a3=7ffdffabc4ec items=0 ppid=1729 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.350000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:02.352000 audit[1826]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1826 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:39:02.352000 audit[1826]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff442da790 a2=0 a3=7fff442da77c items=0 ppid=1729 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.352000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 15 10:39:02.355000 audit[1828]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1828 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:39:02.355000 audit[1828]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc4c2b3d90 a2=0 a3=7ffc4c2b3d7c items=0 ppid=1729 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.355000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 15 10:39:02.360000 audit[1831]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1831 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:39:02.360000 audit[1831]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc220b09c0 a2=0 a3=7ffc220b09ac items=0 ppid=1729 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.360000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 15 10:39:02.361000 audit[1832]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1832 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:39:02.361000 audit[1832]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcd06ca7b0 a2=0 a3=7ffcd06ca79c items=0 ppid=1729 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.361000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 15 10:39:02.364000 audit[1834]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1834 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:39:02.364000 audit[1834]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe1f28f390 a2=0 a3=7ffe1f28f37c items=0 ppid=1729 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.364000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 15 10:39:02.365000 audit[1835]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1835 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:39:02.365000 audit[1835]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc53bc5dd0 a2=0 a3=7ffc53bc5dbc items=0 ppid=1729 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.365000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 15 10:39:02.369000 audit[1837]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1837 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:39:02.369000 audit[1837]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdd51721e0 a2=0 a3=7ffdd51721cc items=0 ppid=1729 pid=1837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.369000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 15 10:39:02.371000 audit[1840]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1840 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:39:02.371000 audit[1840]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffe5ef97ff0 a2=0 a3=7ffe5ef97fdc items=0 ppid=1729 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.371000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 15 10:39:02.371000 audit[1841]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1841 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:39:02.371000 audit[1841]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd6dde6ee0 a2=0 a3=7ffd6dde6ecc items=0 ppid=1729 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.371000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 15 10:39:02.380000 audit[1843]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1843 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:39:02.380000 audit[1843]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffefddb3a80 a2=0 a3=7ffefddb3a6c items=0 ppid=1729 pid=1843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.380000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 15 10:39:02.381000 audit[1844]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1844 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:39:02.381000 audit[1844]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffefa4e67e0 a2=0 a3=7ffefa4e67cc items=0 ppid=1729 pid=1844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.381000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 15 10:39:02.383000 audit[1846]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1846 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:39:02.383000 audit[1846]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc924b70f0 a2=0 a3=7ffc924b70dc items=0 ppid=1729 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.383000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 10:39:02.387000 audit[1849]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1849 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:39:02.387000 audit[1849]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe4b6db070 a2=0 a3=7ffe4b6db05c items=0 ppid=1729 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.387000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 15 10:39:02.391000 audit[1852]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1852 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:39:02.391000 audit[1852]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc93c2bf20 a2=0 a3=7ffc93c2bf0c items=0 ppid=1729 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.391000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 15 10:39:02.392000 audit[1853]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1853 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:39:02.392000 audit[1853]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc1991e290 a2=0 a3=7ffc1991e27c items=0 ppid=1729 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.392000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 15 10:39:02.394000 audit[1855]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1855 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:39:02.394000 audit[1855]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff0c0eb700 a2=0 a3=7fff0c0eb6ec items=0 ppid=1729 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.394000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 10:39:02.397000 audit[1858]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1858 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:39:02.397000 audit[1858]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff2651b510 a2=0 a3=7fff2651b4fc items=0 ppid=1729 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.397000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 10:39:02.399000 audit[1859]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1859 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:39:02.399000 audit[1859]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdb7138650 a2=0 a3=7ffdb713863c items=0 ppid=1729 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.399000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 15 10:39:02.401000 audit[1861]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1861 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:39:02.401000 audit[1861]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffca4e9e170 a2=0 a3=7ffca4e9e15c items=0 ppid=1729 pid=1861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.401000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 15 10:39:02.403000 audit[1862]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1862 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:39:02.403000 audit[1862]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd63daa0f0 a2=0 a3=7ffd63daa0dc items=0 ppid=1729 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.403000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 15 10:39:02.405000 audit[1864]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1864 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:39:02.405000 audit[1864]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffeaa6d8910 a2=0 a3=7ffeaa6d88fc items=0 ppid=1729 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.405000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 10:39:02.409000 audit[1867]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1867 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:39:02.409000 audit[1867]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff7f5a6a70 a2=0 a3=7fff7f5a6a5c items=0 ppid=1729 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.409000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 10:39:02.413000 audit[1869]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1869 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 15 10:39:02.413000 audit[1869]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffeb7a1be80 a2=0 a3=7ffeb7a1be6c items=0 ppid=1729 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.413000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:02.413000 audit[1869]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1869 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 15 10:39:02.413000 audit[1869]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffeb7a1be80 a2=0 a3=7ffeb7a1be6c items=0 ppid=1729 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.413000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:03.020150 kubelet[1451]: E0515 10:39:03.018947 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:03.085441 kubelet[1451]: E0515 10:39:03.085395 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:03.147174 kubelet[1451]: I0515 10:39:03.140963 1451 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-2p556" podStartSLOduration=4.514452565 podStartE2EDuration="12.140943439s" podCreationTimestamp="2025-05-15 10:38:51 +0000 UTC" firstStartedPulling="2025-05-15 10:38:54.127909284 +0000 UTC m=+4.191142769" lastFinishedPulling="2025-05-15 10:39:01.754400169 +0000 UTC m=+11.817633643" observedRunningTime="2025-05-15 10:39:03.140658121 +0000 UTC m=+13.203891615" watchObservedRunningTime="2025-05-15 10:39:03.140943439 +0000 UTC m=+13.204176923" May 15 10:39:03.991346 kubelet[1451]: E0515 10:39:03.991287 1451 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hwpkv" podUID="cca26a38-64ea-47f2-8e19-11a1392a4fe2" May 15 10:39:04.019383 kubelet[1451]: E0515 10:39:04.019300 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:04.088828 kubelet[1451]: E0515 10:39:04.088751 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:05.020928 kubelet[1451]: E0515 10:39:05.020354 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:05.989357 kubelet[1451]: E0515 10:39:05.989284 1451 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hwpkv" podUID="cca26a38-64ea-47f2-8e19-11a1392a4fe2" May 15 10:39:06.021680 kubelet[1451]: E0515 10:39:06.021523 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:07.022120 kubelet[1451]: E0515 10:39:07.021916 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:07.989876 kubelet[1451]: E0515 10:39:07.989782 1451 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hwpkv" podUID="cca26a38-64ea-47f2-8e19-11a1392a4fe2" May 15 10:39:08.022237 kubelet[1451]: E0515 10:39:08.022207 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:09.023333 kubelet[1451]: E0515 10:39:09.023253 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:09.990004 kubelet[1451]: E0515 10:39:09.989946 1451 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hwpkv" podUID="cca26a38-64ea-47f2-8e19-11a1392a4fe2" May 15 10:39:10.024176 kubelet[1451]: E0515 10:39:10.024138 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:10.595551 env[1202]: time="2025-05-15T10:39:10.595479382Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:10.657136 env[1202]: time="2025-05-15T10:39:10.657065592Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:10.682426 env[1202]: time="2025-05-15T10:39:10.682364296Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:10.740040 env[1202]: time="2025-05-15T10:39:10.739988451Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:10.740545 env[1202]: time="2025-05-15T10:39:10.740518233Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9\"" May 15 10:39:10.742578 env[1202]: time="2025-05-15T10:39:10.742543354Z" level=info msg="CreateContainer within sandbox \"317fd064cb251d4a6536a47341fc7dbe52c40f9ce9bdaf895d70d8443e4d6887\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 15 10:39:11.001292 kubelet[1451]: E0515 10:39:11.001176 1451 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:11.024682 kubelet[1451]: E0515 10:39:11.024634 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:11.136805 env[1202]: time="2025-05-15T10:39:11.136729367Z" level=info msg="CreateContainer within sandbox \"317fd064cb251d4a6536a47341fc7dbe52c40f9ce9bdaf895d70d8443e4d6887\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"a48a4f1f3439df2e3dbd54edfe6f57f18b322c2e21ea4cee3c37e8107ecfe56d\"" May 15 10:39:11.137358 env[1202]: time="2025-05-15T10:39:11.137329114Z" level=info msg="StartContainer for \"a48a4f1f3439df2e3dbd54edfe6f57f18b322c2e21ea4cee3c37e8107ecfe56d\"" May 15 10:39:11.162207 systemd[1]: Started cri-containerd-a48a4f1f3439df2e3dbd54edfe6f57f18b322c2e21ea4cee3c37e8107ecfe56d.scope. May 15 10:39:11.642000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:11.645866 kernel: kauditd_printk_skb: 186 callbacks suppressed May 15 10:39:11.646054 kernel: audit: type=1400 audit(1747305551.642:502): avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:11.642000 audit[1877]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f4db75a62c8 items=0 ppid=1581 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:11.654638 kernel: audit: type=1300 audit(1747305551.642:502): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f4db75a62c8 items=0 ppid=1581 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:11.654689 kernel: audit: type=1327 audit(1747305551.642:502): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134386134663166333433396466326533646264353465646665366635 May 15 10:39:11.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134386134663166333433396466326533646264353465646665366635 May 15 10:39:11.659324 kernel: audit: type=1400 audit(1747305551.642:503): avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:11.642000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:11.662717 kernel: audit: type=1400 audit(1747305551.642:503): avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:11.642000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:11.665910 kernel: audit: type=1400 audit(1747305551.642:503): avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:11.642000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:11.642000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:11.672770 kernel: audit: type=1400 audit(1747305551.642:503): avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:11.642000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:11.642000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:11.680652 kernel: audit: type=1400 audit(1747305551.642:503): avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:11.680810 kernel: audit: type=1400 audit(1747305551.642:503): avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:11.680883 kernel: audit: type=1400 audit(1747305551.642:503): avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:11.642000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:11.642000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:11.642000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:11.642000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:11.642000 audit: BPF prog-id=72 op=LOAD May 15 10:39:11.642000 audit[1877]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000f3c58 items=0 ppid=1581 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:11.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134386134663166333433396466326533646264353465646665366635 May 15 10:39:11.647000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:11.647000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:11.647000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:11.647000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:11.647000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:11.647000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:11.647000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:11.647000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:11.647000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:11.647000 audit: BPF prog-id=73 op=LOAD May 15 10:39:11.647000 audit[1877]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000f3ca8 items=0 ppid=1581 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:11.647000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134386134663166333433396466326533646264353465646665366635 May 15 10:39:11.657000 audit: BPF prog-id=73 op=UNLOAD May 15 10:39:11.657000 audit: BPF prog-id=72 op=UNLOAD May 15 10:39:11.657000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:11.657000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:11.657000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:11.657000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:11.657000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:11.657000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:11.657000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:11.657000 audit[1877]: AVC avc: denied { perfmon } for pid=1877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:11.657000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:11.657000 audit[1877]: AVC avc: denied { bpf } for pid=1877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:11.657000 audit: BPF prog-id=74 op=LOAD May 15 10:39:11.657000 audit[1877]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000f3d38 items=0 ppid=1581 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:11.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134386134663166333433396466326533646264353465646665366635 May 15 10:39:11.700742 env[1202]: time="2025-05-15T10:39:11.700677546Z" level=info msg="StartContainer for \"a48a4f1f3439df2e3dbd54edfe6f57f18b322c2e21ea4cee3c37e8107ecfe56d\" returns successfully" May 15 10:39:11.990354 kubelet[1451]: E0515 10:39:11.990176 1451 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hwpkv" podUID="cca26a38-64ea-47f2-8e19-11a1392a4fe2" May 15 10:39:12.025773 kubelet[1451]: E0515 10:39:12.025674 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:12.106466 kubelet[1451]: E0515 10:39:12.106085 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:13.026783 kubelet[1451]: E0515 10:39:13.026735 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:13.181771 kubelet[1451]: E0515 10:39:13.181731 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:13.991291 kubelet[1451]: E0515 10:39:13.991209 1451 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hwpkv" podUID="cca26a38-64ea-47f2-8e19-11a1392a4fe2" May 15 10:39:14.027480 kubelet[1451]: E0515 10:39:14.027408 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:14.822525 env[1202]: time="2025-05-15T10:39:14.822448995Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 15 10:39:14.824215 systemd[1]: cri-containerd-a48a4f1f3439df2e3dbd54edfe6f57f18b322c2e21ea4cee3c37e8107ecfe56d.scope: Deactivated successfully. May 15 10:39:14.824594 systemd[1]: cri-containerd-a48a4f1f3439df2e3dbd54edfe6f57f18b322c2e21ea4cee3c37e8107ecfe56d.scope: Consumed 1.651s CPU time. May 15 10:39:14.830000 audit: BPF prog-id=74 op=UNLOAD May 15 10:39:14.844941 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-a48a4f1f3439df2e3dbd54edfe6f57f18b322c2e21ea4cee3c37e8107ecfe56d-rootfs.mount: Deactivated successfully. May 15 10:39:14.911297 kubelet[1451]: I0515 10:39:14.911252 1451 kubelet_node_status.go:497] "Fast updating node status as it just became ready" May 15 10:39:14.971000 audit[1919]: NETFILTER_CFG table=filter:65 family=2 entries=17 op=nft_register_rule pid=1919 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:14.971000 audit[1919]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd54c21a40 a2=0 a3=7ffd54c21a2c items=0 ppid=1729 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:14.971000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:14.982000 audit[1919]: NETFILTER_CFG table=nat:66 family=2 entries=19 op=nft_register_chain pid=1919 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:14.982000 audit[1919]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffd54c21a40 a2=0 a3=7ffd54c21a2c items=0 ppid=1729 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:14.982000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:15.027936 kubelet[1451]: E0515 10:39:15.027865 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:15.393314 env[1202]: time="2025-05-15T10:39:15.393259227Z" level=info msg="shim disconnected" id=a48a4f1f3439df2e3dbd54edfe6f57f18b322c2e21ea4cee3c37e8107ecfe56d May 15 10:39:15.393314 env[1202]: time="2025-05-15T10:39:15.393311198Z" level=warning msg="cleaning up after shim disconnected" id=a48a4f1f3439df2e3dbd54edfe6f57f18b322c2e21ea4cee3c37e8107ecfe56d namespace=k8s.io May 15 10:39:15.393314 env[1202]: time="2025-05-15T10:39:15.393320484Z" level=info msg="cleaning up dead shim" May 15 10:39:15.399302 env[1202]: time="2025-05-15T10:39:15.399256217Z" level=warning msg="cleanup warnings time=\"2025-05-15T10:39:15Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1920 runtime=io.containerd.runc.v2\n" May 15 10:39:15.638710 kubelet[1451]: I0515 10:39:15.638658 1451 topology_manager.go:215] "Topology Admit Handler" podUID="b2b75d8a-cdf9-4868-bdb4-a0cea7e9c4f0" podNamespace="default" podName="nginx-deployment-85f456d6dd-98d2z" May 15 10:39:15.643670 systemd[1]: Created slice kubepods-besteffort-podb2b75d8a_cdf9_4868_bdb4_a0cea7e9c4f0.slice. May 15 10:39:15.796874 kubelet[1451]: I0515 10:39:15.796789 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-h5qvr\" (UniqueName: \"kubernetes.io/projected/b2b75d8a-cdf9-4868-bdb4-a0cea7e9c4f0-kube-api-access-h5qvr\") pod \"nginx-deployment-85f456d6dd-98d2z\" (UID: \"b2b75d8a-cdf9-4868-bdb4-a0cea7e9c4f0\") " pod="default/nginx-deployment-85f456d6dd-98d2z" May 15 10:39:15.946273 env[1202]: time="2025-05-15T10:39:15.946144939Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-98d2z,Uid:b2b75d8a-cdf9-4868-bdb4-a0cea7e9c4f0,Namespace:default,Attempt:0,}" May 15 10:39:15.995136 systemd[1]: Created slice kubepods-besteffort-podcca26a38_64ea_47f2_8e19_11a1392a4fe2.slice. May 15 10:39:15.997433 env[1202]: time="2025-05-15T10:39:15.997377338Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-hwpkv,Uid:cca26a38-64ea-47f2-8e19-11a1392a4fe2,Namespace:calico-system,Attempt:0,}" May 15 10:39:16.028834 kubelet[1451]: E0515 10:39:16.028758 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:16.189307 kubelet[1451]: E0515 10:39:16.189273 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:16.189988 env[1202]: time="2025-05-15T10:39:16.189936290Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 15 10:39:16.218404 env[1202]: time="2025-05-15T10:39:16.218265803Z" level=error msg="Failed to destroy network for sandbox \"377d7488f356e412836b1b7717686869d4d9c16c8f7ab3e8d491ce04516cb8fb\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:16.218711 env[1202]: time="2025-05-15T10:39:16.218661273Z" level=error msg="encountered an error cleaning up failed sandbox \"377d7488f356e412836b1b7717686869d4d9c16c8f7ab3e8d491ce04516cb8fb\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:16.218877 env[1202]: time="2025-05-15T10:39:16.218721466Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-98d2z,Uid:b2b75d8a-cdf9-4868-bdb4-a0cea7e9c4f0,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"377d7488f356e412836b1b7717686869d4d9c16c8f7ab3e8d491ce04516cb8fb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:16.219024 kubelet[1451]: E0515 10:39:16.218962 1451 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"377d7488f356e412836b1b7717686869d4d9c16c8f7ab3e8d491ce04516cb8fb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:16.219079 kubelet[1451]: E0515 10:39:16.219047 1451 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"377d7488f356e412836b1b7717686869d4d9c16c8f7ab3e8d491ce04516cb8fb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-98d2z" May 15 10:39:16.219121 kubelet[1451]: E0515 10:39:16.219075 1451 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"377d7488f356e412836b1b7717686869d4d9c16c8f7ab3e8d491ce04516cb8fb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-98d2z" May 15 10:39:16.219158 kubelet[1451]: E0515 10:39:16.219121 1451 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-85f456d6dd-98d2z_default(b2b75d8a-cdf9-4868-bdb4-a0cea7e9c4f0)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-85f456d6dd-98d2z_default(b2b75d8a-cdf9-4868-bdb4-a0cea7e9c4f0)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"377d7488f356e412836b1b7717686869d4d9c16c8f7ab3e8d491ce04516cb8fb\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-98d2z" podUID="b2b75d8a-cdf9-4868-bdb4-a0cea7e9c4f0" May 15 10:39:16.305578 env[1202]: time="2025-05-15T10:39:16.305514497Z" level=error msg="Failed to destroy network for sandbox \"f41ebfc0e7094a909f14919e7d2061fc60045b4cde979d1b2271d835b6a0f376\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:16.305866 env[1202]: time="2025-05-15T10:39:16.305841679Z" level=error msg="encountered an error cleaning up failed sandbox \"f41ebfc0e7094a909f14919e7d2061fc60045b4cde979d1b2271d835b6a0f376\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:16.305907 env[1202]: time="2025-05-15T10:39:16.305886152Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-hwpkv,Uid:cca26a38-64ea-47f2-8e19-11a1392a4fe2,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f41ebfc0e7094a909f14919e7d2061fc60045b4cde979d1b2271d835b6a0f376\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:16.306158 kubelet[1451]: E0515 10:39:16.306109 1451 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f41ebfc0e7094a909f14919e7d2061fc60045b4cde979d1b2271d835b6a0f376\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:16.306306 kubelet[1451]: E0515 10:39:16.306166 1451 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f41ebfc0e7094a909f14919e7d2061fc60045b4cde979d1b2271d835b6a0f376\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-hwpkv" May 15 10:39:16.306306 kubelet[1451]: E0515 10:39:16.306188 1451 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f41ebfc0e7094a909f14919e7d2061fc60045b4cde979d1b2271d835b6a0f376\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-hwpkv" May 15 10:39:16.306306 kubelet[1451]: E0515 10:39:16.306230 1451 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-hwpkv_calico-system(cca26a38-64ea-47f2-8e19-11a1392a4fe2)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-hwpkv_calico-system(cca26a38-64ea-47f2-8e19-11a1392a4fe2)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f41ebfc0e7094a909f14919e7d2061fc60045b4cde979d1b2271d835b6a0f376\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-hwpkv" podUID="cca26a38-64ea-47f2-8e19-11a1392a4fe2" May 15 10:39:16.905013 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-f41ebfc0e7094a909f14919e7d2061fc60045b4cde979d1b2271d835b6a0f376-shm.mount: Deactivated successfully. May 15 10:39:16.905132 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-377d7488f356e412836b1b7717686869d4d9c16c8f7ab3e8d491ce04516cb8fb-shm.mount: Deactivated successfully. May 15 10:39:17.029505 kubelet[1451]: E0515 10:39:17.029426 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:17.192516 kubelet[1451]: I0515 10:39:17.192189 1451 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="377d7488f356e412836b1b7717686869d4d9c16c8f7ab3e8d491ce04516cb8fb" May 15 10:39:17.193070 env[1202]: time="2025-05-15T10:39:17.193018597Z" level=info msg="StopPodSandbox for \"377d7488f356e412836b1b7717686869d4d9c16c8f7ab3e8d491ce04516cb8fb\"" May 15 10:39:17.193448 kubelet[1451]: I0515 10:39:17.193335 1451 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f41ebfc0e7094a909f14919e7d2061fc60045b4cde979d1b2271d835b6a0f376" May 15 10:39:17.193658 env[1202]: time="2025-05-15T10:39:17.193626224Z" level=info msg="StopPodSandbox for \"f41ebfc0e7094a909f14919e7d2061fc60045b4cde979d1b2271d835b6a0f376\"" May 15 10:39:17.220072 env[1202]: time="2025-05-15T10:39:17.219989815Z" level=error msg="StopPodSandbox for \"377d7488f356e412836b1b7717686869d4d9c16c8f7ab3e8d491ce04516cb8fb\" failed" error="failed to destroy network for sandbox \"377d7488f356e412836b1b7717686869d4d9c16c8f7ab3e8d491ce04516cb8fb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:17.220388 kubelet[1451]: E0515 10:39:17.220349 1451 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"377d7488f356e412836b1b7717686869d4d9c16c8f7ab3e8d491ce04516cb8fb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="377d7488f356e412836b1b7717686869d4d9c16c8f7ab3e8d491ce04516cb8fb" May 15 10:39:17.220481 kubelet[1451]: E0515 10:39:17.220413 1451 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"377d7488f356e412836b1b7717686869d4d9c16c8f7ab3e8d491ce04516cb8fb"} May 15 10:39:17.220481 kubelet[1451]: E0515 10:39:17.220473 1451 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b2b75d8a-cdf9-4868-bdb4-a0cea7e9c4f0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"377d7488f356e412836b1b7717686869d4d9c16c8f7ab3e8d491ce04516cb8fb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:39:17.220587 kubelet[1451]: E0515 10:39:17.220497 1451 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b2b75d8a-cdf9-4868-bdb4-a0cea7e9c4f0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"377d7488f356e412836b1b7717686869d4d9c16c8f7ab3e8d491ce04516cb8fb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-98d2z" podUID="b2b75d8a-cdf9-4868-bdb4-a0cea7e9c4f0" May 15 10:39:17.220636 env[1202]: time="2025-05-15T10:39:17.220575842Z" level=error msg="StopPodSandbox for \"f41ebfc0e7094a909f14919e7d2061fc60045b4cde979d1b2271d835b6a0f376\" failed" error="failed to destroy network for sandbox \"f41ebfc0e7094a909f14919e7d2061fc60045b4cde979d1b2271d835b6a0f376\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:17.220717 kubelet[1451]: E0515 10:39:17.220687 1451 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f41ebfc0e7094a909f14919e7d2061fc60045b4cde979d1b2271d835b6a0f376\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f41ebfc0e7094a909f14919e7d2061fc60045b4cde979d1b2271d835b6a0f376" May 15 10:39:17.220767 kubelet[1451]: E0515 10:39:17.220720 1451 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f41ebfc0e7094a909f14919e7d2061fc60045b4cde979d1b2271d835b6a0f376"} May 15 10:39:17.220767 kubelet[1451]: E0515 10:39:17.220749 1451 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"cca26a38-64ea-47f2-8e19-11a1392a4fe2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f41ebfc0e7094a909f14919e7d2061fc60045b4cde979d1b2271d835b6a0f376\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:39:17.220851 kubelet[1451]: E0515 10:39:17.220772 1451 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"cca26a38-64ea-47f2-8e19-11a1392a4fe2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f41ebfc0e7094a909f14919e7d2061fc60045b4cde979d1b2271d835b6a0f376\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-hwpkv" podUID="cca26a38-64ea-47f2-8e19-11a1392a4fe2" May 15 10:39:18.030504 kubelet[1451]: E0515 10:39:18.030425 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:19.031275 kubelet[1451]: E0515 10:39:19.031177 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:20.032219 kubelet[1451]: E0515 10:39:20.032139 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:21.033129 kubelet[1451]: E0515 10:39:21.033060 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:22.033295 kubelet[1451]: E0515 10:39:22.033237 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:23.033414 kubelet[1451]: E0515 10:39:23.033340 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:23.859196 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3631964751.mount: Deactivated successfully. May 15 10:39:24.034345 kubelet[1451]: E0515 10:39:24.034289 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:25.013647 env[1202]: time="2025-05-15T10:39:25.013581733Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:25.016894 env[1202]: time="2025-05-15T10:39:25.016859681Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:25.018565 env[1202]: time="2025-05-15T10:39:25.018524188Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:25.020281 env[1202]: time="2025-05-15T10:39:25.020212750Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:25.020468 env[1202]: time="2025-05-15T10:39:25.020436208Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae\"" May 15 10:39:25.029271 env[1202]: time="2025-05-15T10:39:25.029219164Z" level=info msg="CreateContainer within sandbox \"317fd064cb251d4a6536a47341fc7dbe52c40f9ce9bdaf895d70d8443e4d6887\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 15 10:39:25.035326 kubelet[1451]: E0515 10:39:25.035274 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:25.045677 env[1202]: time="2025-05-15T10:39:25.045618272Z" level=info msg="CreateContainer within sandbox \"317fd064cb251d4a6536a47341fc7dbe52c40f9ce9bdaf895d70d8443e4d6887\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"08ce1f5fd972d9b5116891b7bc4c6457be8ab537d4c8e172d6ec233f00a0e7f4\"" May 15 10:39:25.046182 env[1202]: time="2025-05-15T10:39:25.046150399Z" level=info msg="StartContainer for \"08ce1f5fd972d9b5116891b7bc4c6457be8ab537d4c8e172d6ec233f00a0e7f4\"" May 15 10:39:25.062800 systemd[1]: Started cri-containerd-08ce1f5fd972d9b5116891b7bc4c6457be8ab537d4c8e172d6ec233f00a0e7f4.scope. May 15 10:39:25.076000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:25.081357 kernel: kauditd_printk_skb: 40 callbacks suppressed May 15 10:39:25.081431 kernel: audit: type=1400 audit(1747305565.076:511): avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:25.076000 audit[2066]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f80a45d9198 items=0 ppid=1581 pid=2066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:25.089511 kernel: audit: type=1300 audit(1747305565.076:511): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f80a45d9198 items=0 ppid=1581 pid=2066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:25.089572 kernel: audit: type=1327 audit(1747305565.076:511): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038636531663566643937326439623531313638393162376263346336 May 15 10:39:25.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038636531663566643937326439623531313638393162376263346336 May 15 10:39:25.093625 kernel: audit: type=1400 audit(1747305565.076:512): avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:25.076000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:25.096474 kernel: audit: type=1400 audit(1747305565.076:512): avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:25.076000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:25.099317 kernel: audit: type=1400 audit(1747305565.076:512): avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:25.076000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:25.076000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:25.105397 kernel: audit: type=1400 audit(1747305565.076:512): avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:25.105446 kernel: audit: type=1400 audit(1747305565.076:512): avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:25.076000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:25.076000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:25.112471 kernel: audit: type=1400 audit(1747305565.076:512): avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:25.076000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:25.115841 kernel: audit: type=1400 audit(1747305565.076:512): avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:25.076000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:25.076000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:25.076000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:25.076000 audit: BPF prog-id=75 op=LOAD May 15 10:39:25.076000 audit[2066]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000245c88 items=0 ppid=1581 pid=2066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:25.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038636531663566643937326439623531313638393162376263346336 May 15 10:39:25.084000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:25.084000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:25.084000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:25.084000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:25.084000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:25.084000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:25.084000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:25.084000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:25.084000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:25.084000 audit: BPF prog-id=76 op=LOAD May 15 10:39:25.084000 audit[2066]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000245cd8 items=0 ppid=1581 pid=2066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:25.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038636531663566643937326439623531313638393162376263346336 May 15 10:39:25.088000 audit: BPF prog-id=76 op=UNLOAD May 15 10:39:25.088000 audit: BPF prog-id=75 op=UNLOAD May 15 10:39:25.088000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:25.088000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:25.088000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:25.088000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:25.088000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:25.088000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:25.088000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:25.088000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:25.088000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:25.088000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:25.088000 audit: BPF prog-id=77 op=LOAD May 15 10:39:25.088000 audit[2066]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000245d68 items=0 ppid=1581 pid=2066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:25.088000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038636531663566643937326439623531313638393162376263346336 May 15 10:39:25.181409 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 15 10:39:25.181533 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 15 10:39:25.186366 env[1202]: time="2025-05-15T10:39:25.186288999Z" level=info msg="StartContainer for \"08ce1f5fd972d9b5116891b7bc4c6457be8ab537d4c8e172d6ec233f00a0e7f4\" returns successfully" May 15 10:39:25.203441 systemd[1]: cri-containerd-08ce1f5fd972d9b5116891b7bc4c6457be8ab537d4c8e172d6ec233f00a0e7f4.scope: Deactivated successfully. May 15 10:39:25.206000 audit: BPF prog-id=77 op=UNLOAD May 15 10:39:25.222836 kubelet[1451]: E0515 10:39:25.222788 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:25.243977 kubelet[1451]: I0515 10:39:25.243889 1451 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-jcdjs" podStartSLOduration=3.347710926 podStartE2EDuration="34.243869092s" podCreationTimestamp="2025-05-15 10:38:51 +0000 UTC" firstStartedPulling="2025-05-15 10:38:54.125126409 +0000 UTC m=+4.188359894" lastFinishedPulling="2025-05-15 10:39:25.021284576 +0000 UTC m=+35.084518060" observedRunningTime="2025-05-15 10:39:25.243837513 +0000 UTC m=+35.307071017" watchObservedRunningTime="2025-05-15 10:39:25.243869092 +0000 UTC m=+35.307102597" May 15 10:39:25.676926 env[1202]: time="2025-05-15T10:39:25.676869549Z" level=info msg="shim disconnected" id=08ce1f5fd972d9b5116891b7bc4c6457be8ab537d4c8e172d6ec233f00a0e7f4 May 15 10:39:25.676926 env[1202]: time="2025-05-15T10:39:25.676920194Z" level=warning msg="cleaning up after shim disconnected" id=08ce1f5fd972d9b5116891b7bc4c6457be8ab537d4c8e172d6ec233f00a0e7f4 namespace=k8s.io May 15 10:39:25.676926 env[1202]: time="2025-05-15T10:39:25.676929341Z" level=info msg="cleaning up dead shim" May 15 10:39:25.677232 env[1202]: time="2025-05-15T10:39:25.676872425Z" level=error msg="ExecSync for \"08ce1f5fd972d9b5116891b7bc4c6457be8ab537d4c8e172d6ec233f00a0e7f4\" failed" error="rpc error: code = NotFound desc = failed to exec in container: failed to create exec \"9d48612e69fe5a016603f76e77dbe2aee12f0ae7e2e7557488e59087211499bb\": task 08ce1f5fd972d9b5116891b7bc4c6457be8ab537d4c8e172d6ec233f00a0e7f4 not found: not found" May 15 10:39:25.677501 kubelet[1451]: E0515 10:39:25.677445 1451 remote_runtime.go:496] "ExecSync cmd from runtime service failed" err="rpc error: code = NotFound desc = failed to exec in container: failed to create exec \"9d48612e69fe5a016603f76e77dbe2aee12f0ae7e2e7557488e59087211499bb\": task 08ce1f5fd972d9b5116891b7bc4c6457be8ab537d4c8e172d6ec233f00a0e7f4 not found: not found" containerID="08ce1f5fd972d9b5116891b7bc4c6457be8ab537d4c8e172d6ec233f00a0e7f4" cmd=["/bin/calico-node","-bird-ready","-felix-ready"] May 15 10:39:25.678423 env[1202]: time="2025-05-15T10:39:25.678396027Z" level=error msg="ExecSync for \"08ce1f5fd972d9b5116891b7bc4c6457be8ab537d4c8e172d6ec233f00a0e7f4\" failed" error="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task 08ce1f5fd972d9b5116891b7bc4c6457be8ab537d4c8e172d6ec233f00a0e7f4 not found: not found" May 15 10:39:25.678589 kubelet[1451]: E0515 10:39:25.678547 1451 remote_runtime.go:496] "ExecSync cmd from runtime service failed" err="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task 08ce1f5fd972d9b5116891b7bc4c6457be8ab537d4c8e172d6ec233f00a0e7f4 not found: not found" containerID="08ce1f5fd972d9b5116891b7bc4c6457be8ab537d4c8e172d6ec233f00a0e7f4" cmd=["/bin/calico-node","-bird-ready","-felix-ready"] May 15 10:39:25.679411 env[1202]: time="2025-05-15T10:39:25.679374379Z" level=error msg="ExecSync for \"08ce1f5fd972d9b5116891b7bc4c6457be8ab537d4c8e172d6ec233f00a0e7f4\" failed" error="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task 08ce1f5fd972d9b5116891b7bc4c6457be8ab537d4c8e172d6ec233f00a0e7f4 not found: not found" May 15 10:39:25.679514 kubelet[1451]: E0515 10:39:25.679478 1451 remote_runtime.go:496] "ExecSync cmd from runtime service failed" err="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task 08ce1f5fd972d9b5116891b7bc4c6457be8ab537d4c8e172d6ec233f00a0e7f4 not found: not found" containerID="08ce1f5fd972d9b5116891b7bc4c6457be8ab537d4c8e172d6ec233f00a0e7f4" cmd=["/bin/calico-node","-bird-ready","-felix-ready"] May 15 10:39:25.683158 env[1202]: time="2025-05-15T10:39:25.683130844Z" level=warning msg="cleanup warnings time=\"2025-05-15T10:39:25Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2117 runtime=io.containerd.runc.v2\n" May 15 10:39:26.025453 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-08ce1f5fd972d9b5116891b7bc4c6457be8ab537d4c8e172d6ec233f00a0e7f4-rootfs.mount: Deactivated successfully. May 15 10:39:26.036130 kubelet[1451]: E0515 10:39:26.036094 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:26.226264 kubelet[1451]: I0515 10:39:26.226230 1451 scope.go:117] "RemoveContainer" containerID="08ce1f5fd972d9b5116891b7bc4c6457be8ab537d4c8e172d6ec233f00a0e7f4" May 15 10:39:26.226474 kubelet[1451]: E0515 10:39:26.226309 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:26.228475 env[1202]: time="2025-05-15T10:39:26.228425606Z" level=info msg="CreateContainer within sandbox \"317fd064cb251d4a6536a47341fc7dbe52c40f9ce9bdaf895d70d8443e4d6887\" for container &ContainerMetadata{Name:calico-node,Attempt:1,}" May 15 10:39:26.245460 env[1202]: time="2025-05-15T10:39:26.245394133Z" level=info msg="CreateContainer within sandbox \"317fd064cb251d4a6536a47341fc7dbe52c40f9ce9bdaf895d70d8443e4d6887\" for &ContainerMetadata{Name:calico-node,Attempt:1,} returns container id \"e581a2bcf519899fd3814bda37c8eeb46a23cd8aba79810079867920846b126e\"" May 15 10:39:26.245909 env[1202]: time="2025-05-15T10:39:26.245883529Z" level=info msg="StartContainer for \"e581a2bcf519899fd3814bda37c8eeb46a23cd8aba79810079867920846b126e\"" May 15 10:39:26.261877 systemd[1]: Started cri-containerd-e581a2bcf519899fd3814bda37c8eeb46a23cd8aba79810079867920846b126e.scope. May 15 10:39:26.276000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:26.276000 audit[2137]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7ff09a9df9f8 items=0 ppid=1581 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:26.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535383161326263663531393839396664333831346264613337633865 May 15 10:39:26.276000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:26.276000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:26.276000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:26.276000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:26.276000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:26.276000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:26.276000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:26.276000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:26.276000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:26.276000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:26.276000 audit: BPF prog-id=78 op=LOAD May 15 10:39:26.276000 audit[2137]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00022e678 items=0 ppid=1581 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:26.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535383161326263663531393839396664333831346264613337633865 May 15 10:39:26.276000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:26.276000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:26.276000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:26.276000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:26.276000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:26.276000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:26.276000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:26.276000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:26.276000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:26.276000 audit: BPF prog-id=79 op=LOAD May 15 10:39:26.276000 audit[2137]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00022e6c8 items=0 ppid=1581 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:26.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535383161326263663531393839396664333831346264613337633865 May 15 10:39:26.276000 audit: BPF prog-id=79 op=UNLOAD May 15 10:39:26.277000 audit: BPF prog-id=78 op=UNLOAD May 15 10:39:26.277000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:26.277000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:26.277000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:26.277000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:26.277000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:26.277000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:26.277000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:26.277000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:26.277000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:26.277000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:26.277000 audit: BPF prog-id=80 op=LOAD May 15 10:39:26.277000 audit[2137]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00022e758 items=0 ppid=1581 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:26.277000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535383161326263663531393839396664333831346264613337633865 May 15 10:39:26.289958 env[1202]: time="2025-05-15T10:39:26.289792760Z" level=info msg="StartContainer for \"e581a2bcf519899fd3814bda37c8eeb46a23cd8aba79810079867920846b126e\" returns successfully" May 15 10:39:26.334884 systemd[1]: cri-containerd-e581a2bcf519899fd3814bda37c8eeb46a23cd8aba79810079867920846b126e.scope: Deactivated successfully. May 15 10:39:26.339000 audit: BPF prog-id=80 op=UNLOAD May 15 10:39:26.356921 env[1202]: time="2025-05-15T10:39:26.356873225Z" level=info msg="shim disconnected" id=e581a2bcf519899fd3814bda37c8eeb46a23cd8aba79810079867920846b126e May 15 10:39:26.356921 env[1202]: time="2025-05-15T10:39:26.356917177Z" level=warning msg="cleaning up after shim disconnected" id=e581a2bcf519899fd3814bda37c8eeb46a23cd8aba79810079867920846b126e namespace=k8s.io May 15 10:39:26.356921 env[1202]: time="2025-05-15T10:39:26.356924771Z" level=info msg="cleaning up dead shim" May 15 10:39:26.364116 env[1202]: time="2025-05-15T10:39:26.364067737Z" level=warning msg="cleanup warnings time=\"2025-05-15T10:39:26Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2180 runtime=io.containerd.runc.v2\n" May 15 10:39:27.025624 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e581a2bcf519899fd3814bda37c8eeb46a23cd8aba79810079867920846b126e-rootfs.mount: Deactivated successfully. May 15 10:39:27.036535 kubelet[1451]: E0515 10:39:27.036482 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:27.230201 kubelet[1451]: I0515 10:39:27.230160 1451 scope.go:117] "RemoveContainer" containerID="08ce1f5fd972d9b5116891b7bc4c6457be8ab537d4c8e172d6ec233f00a0e7f4" May 15 10:39:27.230566 kubelet[1451]: I0515 10:39:27.230544 1451 scope.go:117] "RemoveContainer" containerID="e581a2bcf519899fd3814bda37c8eeb46a23cd8aba79810079867920846b126e" May 15 10:39:27.230633 kubelet[1451]: E0515 10:39:27.230618 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:27.231160 kubelet[1451]: E0515 10:39:27.231102 1451 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 10s restarting failed container=calico-node pod=calico-node-jcdjs_calico-system(a96f0651-8968-4b81-993b-b6785afc2b65)\"" pod="calico-system/calico-node-jcdjs" podUID="a96f0651-8968-4b81-993b-b6785afc2b65" May 15 10:39:27.231503 env[1202]: time="2025-05-15T10:39:27.231467256Z" level=info msg="RemoveContainer for \"08ce1f5fd972d9b5116891b7bc4c6457be8ab537d4c8e172d6ec233f00a0e7f4\"" May 15 10:39:27.237882 env[1202]: time="2025-05-15T10:39:27.237802100Z" level=info msg="RemoveContainer for \"08ce1f5fd972d9b5116891b7bc4c6457be8ab537d4c8e172d6ec233f00a0e7f4\" returns successfully" May 15 10:39:28.037211 kubelet[1451]: E0515 10:39:28.037135 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:28.234258 kubelet[1451]: I0515 10:39:28.234219 1451 scope.go:117] "RemoveContainer" containerID="e581a2bcf519899fd3814bda37c8eeb46a23cd8aba79810079867920846b126e" May 15 10:39:28.234453 kubelet[1451]: E0515 10:39:28.234284 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:28.234662 kubelet[1451]: E0515 10:39:28.234630 1451 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 10s restarting failed container=calico-node pod=calico-node-jcdjs_calico-system(a96f0651-8968-4b81-993b-b6785afc2b65)\"" pod="calico-system/calico-node-jcdjs" podUID="a96f0651-8968-4b81-993b-b6785afc2b65" May 15 10:39:28.990381 env[1202]: time="2025-05-15T10:39:28.990304991Z" level=info msg="StopPodSandbox for \"f41ebfc0e7094a909f14919e7d2061fc60045b4cde979d1b2271d835b6a0f376\"" May 15 10:39:29.018114 env[1202]: time="2025-05-15T10:39:29.018037217Z" level=error msg="StopPodSandbox for \"f41ebfc0e7094a909f14919e7d2061fc60045b4cde979d1b2271d835b6a0f376\" failed" error="failed to destroy network for sandbox \"f41ebfc0e7094a909f14919e7d2061fc60045b4cde979d1b2271d835b6a0f376\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:29.018335 kubelet[1451]: E0515 10:39:29.018291 1451 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f41ebfc0e7094a909f14919e7d2061fc60045b4cde979d1b2271d835b6a0f376\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f41ebfc0e7094a909f14919e7d2061fc60045b4cde979d1b2271d835b6a0f376" May 15 10:39:29.018412 kubelet[1451]: E0515 10:39:29.018347 1451 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f41ebfc0e7094a909f14919e7d2061fc60045b4cde979d1b2271d835b6a0f376"} May 15 10:39:29.018412 kubelet[1451]: E0515 10:39:29.018383 1451 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"cca26a38-64ea-47f2-8e19-11a1392a4fe2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f41ebfc0e7094a909f14919e7d2061fc60045b4cde979d1b2271d835b6a0f376\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:39:29.018412 kubelet[1451]: E0515 10:39:29.018404 1451 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"cca26a38-64ea-47f2-8e19-11a1392a4fe2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f41ebfc0e7094a909f14919e7d2061fc60045b4cde979d1b2271d835b6a0f376\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-hwpkv" podUID="cca26a38-64ea-47f2-8e19-11a1392a4fe2" May 15 10:39:29.037613 kubelet[1451]: E0515 10:39:29.037536 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:29.100984 update_engine[1194]: I0515 10:39:29.100914 1194 update_attempter.cc:509] Updating boot flags... May 15 10:39:29.341633 kubelet[1451]: I0515 10:39:29.341499 1451 scope.go:117] "RemoveContainer" containerID="e581a2bcf519899fd3814bda37c8eeb46a23cd8aba79810079867920846b126e" May 15 10:39:29.341633 kubelet[1451]: E0515 10:39:29.341587 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:29.342200 kubelet[1451]: E0515 10:39:29.342158 1451 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 10s restarting failed container=calico-node pod=calico-node-jcdjs_calico-system(a96f0651-8968-4b81-993b-b6785afc2b65)\"" pod="calico-system/calico-node-jcdjs" podUID="a96f0651-8968-4b81-993b-b6785afc2b65" May 15 10:39:30.037979 kubelet[1451]: E0515 10:39:30.037933 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:31.001986 kubelet[1451]: E0515 10:39:31.001900 1451 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:31.038486 kubelet[1451]: E0515 10:39:31.038416 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:32.039356 kubelet[1451]: E0515 10:39:32.039283 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:32.990401 env[1202]: time="2025-05-15T10:39:32.990329120Z" level=info msg="StopPodSandbox for \"377d7488f356e412836b1b7717686869d4d9c16c8f7ab3e8d491ce04516cb8fb\"" May 15 10:39:33.016166 env[1202]: time="2025-05-15T10:39:33.016096686Z" level=error msg="StopPodSandbox for \"377d7488f356e412836b1b7717686869d4d9c16c8f7ab3e8d491ce04516cb8fb\" failed" error="failed to destroy network for sandbox \"377d7488f356e412836b1b7717686869d4d9c16c8f7ab3e8d491ce04516cb8fb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:33.016390 kubelet[1451]: E0515 10:39:33.016343 1451 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"377d7488f356e412836b1b7717686869d4d9c16c8f7ab3e8d491ce04516cb8fb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="377d7488f356e412836b1b7717686869d4d9c16c8f7ab3e8d491ce04516cb8fb" May 15 10:39:33.016449 kubelet[1451]: E0515 10:39:33.016407 1451 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"377d7488f356e412836b1b7717686869d4d9c16c8f7ab3e8d491ce04516cb8fb"} May 15 10:39:33.016496 kubelet[1451]: E0515 10:39:33.016453 1451 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b2b75d8a-cdf9-4868-bdb4-a0cea7e9c4f0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"377d7488f356e412836b1b7717686869d4d9c16c8f7ab3e8d491ce04516cb8fb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:39:33.016496 kubelet[1451]: E0515 10:39:33.016482 1451 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b2b75d8a-cdf9-4868-bdb4-a0cea7e9c4f0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"377d7488f356e412836b1b7717686869d4d9c16c8f7ab3e8d491ce04516cb8fb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-98d2z" podUID="b2b75d8a-cdf9-4868-bdb4-a0cea7e9c4f0" May 15 10:39:33.039612 kubelet[1451]: E0515 10:39:33.039553 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:34.039953 kubelet[1451]: E0515 10:39:34.039897 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:35.040205 kubelet[1451]: E0515 10:39:35.040140 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:36.041051 kubelet[1451]: E0515 10:39:36.041004 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:37.041917 kubelet[1451]: E0515 10:39:37.041851 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:38.042834 kubelet[1451]: E0515 10:39:38.042770 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:39.043785 kubelet[1451]: E0515 10:39:39.043713 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:40.043935 kubelet[1451]: E0515 10:39:40.043882 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:40.990587 kubelet[1451]: I0515 10:39:40.990544 1451 scope.go:117] "RemoveContainer" containerID="e581a2bcf519899fd3814bda37c8eeb46a23cd8aba79810079867920846b126e" May 15 10:39:40.990766 kubelet[1451]: E0515 10:39:40.990635 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:40.993528 env[1202]: time="2025-05-15T10:39:40.993485319Z" level=info msg="CreateContainer within sandbox \"317fd064cb251d4a6536a47341fc7dbe52c40f9ce9bdaf895d70d8443e4d6887\" for container &ContainerMetadata{Name:calico-node,Attempt:2,}" May 15 10:39:41.007340 env[1202]: time="2025-05-15T10:39:41.007275314Z" level=info msg="CreateContainer within sandbox \"317fd064cb251d4a6536a47341fc7dbe52c40f9ce9bdaf895d70d8443e4d6887\" for &ContainerMetadata{Name:calico-node,Attempt:2,} returns container id \"e6afa52d90c2dd1242e116ab8422fd46f507bf936e62d710bee25fd9a6bb4815\"" May 15 10:39:41.007884 env[1202]: time="2025-05-15T10:39:41.007854550Z" level=info msg="StartContainer for \"e6afa52d90c2dd1242e116ab8422fd46f507bf936e62d710bee25fd9a6bb4815\"" May 15 10:39:41.026602 systemd[1]: Started cri-containerd-e6afa52d90c2dd1242e116ab8422fd46f507bf936e62d710bee25fd9a6bb4815.scope. May 15 10:39:41.038000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.040801 kernel: kauditd_printk_skb: 78 callbacks suppressed May 15 10:39:41.040901 kernel: audit: type=1400 audit(1747305581.038:525): avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.044010 kubelet[1451]: E0515 10:39:41.043967 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:41.038000 audit[2262]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fe044af0bd8 items=0 ppid=1581 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:41.049919 kernel: audit: type=1300 audit(1747305581.038:525): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fe044af0bd8 items=0 ppid=1581 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:41.049994 kernel: audit: type=1327 audit(1747305581.038:525): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536616661353264393063326464313234326531313661623834323266 May 15 10:39:41.038000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536616661353264393063326464313234326531313661623834323266 May 15 10:39:41.038000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.058591 kernel: audit: type=1400 audit(1747305581.038:526): avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.058639 kernel: audit: type=1400 audit(1747305581.038:526): avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.038000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.038000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.066117 kernel: audit: type=1400 audit(1747305581.038:526): avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.066222 kernel: audit: type=1400 audit(1747305581.038:526): avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.038000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.038000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.073868 kernel: audit: type=1400 audit(1747305581.038:526): avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.074315 kernel: audit: type=1400 audit(1747305581.038:526): avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.038000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.077007 env[1202]: time="2025-05-15T10:39:41.076959729Z" level=info msg="StartContainer for \"e6afa52d90c2dd1242e116ab8422fd46f507bf936e62d710bee25fd9a6bb4815\" returns successfully" May 15 10:39:41.038000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.081758 kernel: audit: type=1400 audit(1747305581.038:526): avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.038000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.038000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.038000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.038000 audit: BPF prog-id=81 op=LOAD May 15 10:39:41.038000 audit[2262]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000a1758 items=0 ppid=1581 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:41.038000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536616661353264393063326464313234326531313661623834323266 May 15 10:39:41.043000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.043000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.043000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.043000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.043000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.043000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.043000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.043000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.043000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.043000 audit: BPF prog-id=82 op=LOAD May 15 10:39:41.043000 audit[2262]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000a17a8 items=0 ppid=1581 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:41.043000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536616661353264393063326464313234326531313661623834323266 May 15 10:39:41.049000 audit: BPF prog-id=82 op=UNLOAD May 15 10:39:41.049000 audit: BPF prog-id=81 op=UNLOAD May 15 10:39:41.049000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.049000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.049000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.049000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.049000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.049000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.049000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.049000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.049000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.049000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:41.049000 audit: BPF prog-id=83 op=LOAD May 15 10:39:41.049000 audit[2262]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000a1838 items=0 ppid=1581 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:41.049000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536616661353264393063326464313234326531313661623834323266 May 15 10:39:41.123235 systemd[1]: cri-containerd-e6afa52d90c2dd1242e116ab8422fd46f507bf936e62d710bee25fd9a6bb4815.scope: Deactivated successfully. May 15 10:39:41.126000 audit: BPF prog-id=83 op=UNLOAD May 15 10:39:41.150178 env[1202]: time="2025-05-15T10:39:41.150117693Z" level=info msg="shim disconnected" id=e6afa52d90c2dd1242e116ab8422fd46f507bf936e62d710bee25fd9a6bb4815 May 15 10:39:41.150178 env[1202]: time="2025-05-15T10:39:41.150162006Z" level=warning msg="cleaning up after shim disconnected" id=e6afa52d90c2dd1242e116ab8422fd46f507bf936e62d710bee25fd9a6bb4815 namespace=k8s.io May 15 10:39:41.150178 env[1202]: time="2025-05-15T10:39:41.150170442Z" level=info msg="cleaning up dead shim" May 15 10:39:41.156891 env[1202]: time="2025-05-15T10:39:41.156832989Z" level=warning msg="cleanup warnings time=\"2025-05-15T10:39:41Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2306 runtime=io.containerd.runc.v2\n" May 15 10:39:41.257201 kubelet[1451]: I0515 10:39:41.257105 1451 scope.go:117] "RemoveContainer" containerID="e581a2bcf519899fd3814bda37c8eeb46a23cd8aba79810079867920846b126e" May 15 10:39:41.257553 kubelet[1451]: I0515 10:39:41.257525 1451 scope.go:117] "RemoveContainer" containerID="e6afa52d90c2dd1242e116ab8422fd46f507bf936e62d710bee25fd9a6bb4815" May 15 10:39:41.257659 kubelet[1451]: E0515 10:39:41.257611 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:41.258354 kubelet[1451]: E0515 10:39:41.258316 1451 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 20s restarting failed container=calico-node pod=calico-node-jcdjs_calico-system(a96f0651-8968-4b81-993b-b6785afc2b65)\"" pod="calico-system/calico-node-jcdjs" podUID="a96f0651-8968-4b81-993b-b6785afc2b65" May 15 10:39:41.259394 env[1202]: time="2025-05-15T10:39:41.259365568Z" level=info msg="RemoveContainer for \"e581a2bcf519899fd3814bda37c8eeb46a23cd8aba79810079867920846b126e\"" May 15 10:39:41.264720 env[1202]: time="2025-05-15T10:39:41.264691872Z" level=info msg="RemoveContainer for \"e581a2bcf519899fd3814bda37c8eeb46a23cd8aba79810079867920846b126e\" returns successfully" May 15 10:39:42.002960 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e6afa52d90c2dd1242e116ab8422fd46f507bf936e62d710bee25fd9a6bb4815-rootfs.mount: Deactivated successfully. May 15 10:39:42.044800 kubelet[1451]: E0515 10:39:42.044732 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:43.044941 kubelet[1451]: E0515 10:39:43.044875 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:43.990121 env[1202]: time="2025-05-15T10:39:43.990068105Z" level=info msg="StopPodSandbox for \"f41ebfc0e7094a909f14919e7d2061fc60045b4cde979d1b2271d835b6a0f376\"" May 15 10:39:44.014539 env[1202]: time="2025-05-15T10:39:44.014460156Z" level=error msg="StopPodSandbox for \"f41ebfc0e7094a909f14919e7d2061fc60045b4cde979d1b2271d835b6a0f376\" failed" error="failed to destroy network for sandbox \"f41ebfc0e7094a909f14919e7d2061fc60045b4cde979d1b2271d835b6a0f376\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:44.014808 kubelet[1451]: E0515 10:39:44.014760 1451 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f41ebfc0e7094a909f14919e7d2061fc60045b4cde979d1b2271d835b6a0f376\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f41ebfc0e7094a909f14919e7d2061fc60045b4cde979d1b2271d835b6a0f376" May 15 10:39:44.014892 kubelet[1451]: E0515 10:39:44.014830 1451 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f41ebfc0e7094a909f14919e7d2061fc60045b4cde979d1b2271d835b6a0f376"} May 15 10:39:44.014892 kubelet[1451]: E0515 10:39:44.014870 1451 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"cca26a38-64ea-47f2-8e19-11a1392a4fe2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f41ebfc0e7094a909f14919e7d2061fc60045b4cde979d1b2271d835b6a0f376\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:39:44.014980 kubelet[1451]: E0515 10:39:44.014893 1451 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"cca26a38-64ea-47f2-8e19-11a1392a4fe2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f41ebfc0e7094a909f14919e7d2061fc60045b4cde979d1b2271d835b6a0f376\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-hwpkv" podUID="cca26a38-64ea-47f2-8e19-11a1392a4fe2" May 15 10:39:44.045199 kubelet[1451]: E0515 10:39:44.045159 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:45.045740 kubelet[1451]: E0515 10:39:45.045679 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:46.046355 kubelet[1451]: E0515 10:39:46.046273 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:46.990364 env[1202]: time="2025-05-15T10:39:46.990303072Z" level=info msg="StopPodSandbox for \"377d7488f356e412836b1b7717686869d4d9c16c8f7ab3e8d491ce04516cb8fb\"" May 15 10:39:47.017897 env[1202]: time="2025-05-15T10:39:47.017799535Z" level=error msg="StopPodSandbox for \"377d7488f356e412836b1b7717686869d4d9c16c8f7ab3e8d491ce04516cb8fb\" failed" error="failed to destroy network for sandbox \"377d7488f356e412836b1b7717686869d4d9c16c8f7ab3e8d491ce04516cb8fb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:47.018158 kubelet[1451]: E0515 10:39:47.018117 1451 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"377d7488f356e412836b1b7717686869d4d9c16c8f7ab3e8d491ce04516cb8fb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="377d7488f356e412836b1b7717686869d4d9c16c8f7ab3e8d491ce04516cb8fb" May 15 10:39:47.018244 kubelet[1451]: E0515 10:39:47.018172 1451 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"377d7488f356e412836b1b7717686869d4d9c16c8f7ab3e8d491ce04516cb8fb"} May 15 10:39:47.018244 kubelet[1451]: E0515 10:39:47.018222 1451 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b2b75d8a-cdf9-4868-bdb4-a0cea7e9c4f0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"377d7488f356e412836b1b7717686869d4d9c16c8f7ab3e8d491ce04516cb8fb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:39:47.018365 kubelet[1451]: E0515 10:39:47.018248 1451 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b2b75d8a-cdf9-4868-bdb4-a0cea7e9c4f0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"377d7488f356e412836b1b7717686869d4d9c16c8f7ab3e8d491ce04516cb8fb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-98d2z" podUID="b2b75d8a-cdf9-4868-bdb4-a0cea7e9c4f0" May 15 10:39:47.046691 kubelet[1451]: E0515 10:39:47.046584 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:47.373912 env[1202]: time="2025-05-15T10:39:47.373853360Z" level=info msg="StopPodSandbox for \"317fd064cb251d4a6536a47341fc7dbe52c40f9ce9bdaf895d70d8443e4d6887\"" May 15 10:39:47.374100 env[1202]: time="2025-05-15T10:39:47.373937798Z" level=info msg="Container to stop \"90a7b727c0312e880119abc17fc0084a2d47237ee9cc7f795ed9a41f8963a327\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 15 10:39:47.374100 env[1202]: time="2025-05-15T10:39:47.373955722Z" level=info msg="Container to stop \"a48a4f1f3439df2e3dbd54edfe6f57f18b322c2e21ea4cee3c37e8107ecfe56d\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 15 10:39:47.374100 env[1202]: time="2025-05-15T10:39:47.373968246Z" level=info msg="Container to stop \"e6afa52d90c2dd1242e116ab8422fd46f507bf936e62d710bee25fd9a6bb4815\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 15 10:39:47.376258 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-317fd064cb251d4a6536a47341fc7dbe52c40f9ce9bdaf895d70d8443e4d6887-shm.mount: Deactivated successfully. May 15 10:39:47.379876 systemd[1]: cri-containerd-317fd064cb251d4a6536a47341fc7dbe52c40f9ce9bdaf895d70d8443e4d6887.scope: Deactivated successfully. May 15 10:39:47.379000 audit: BPF prog-id=60 op=UNLOAD May 15 10:39:47.381697 kernel: kauditd_printk_skb: 34 callbacks suppressed May 15 10:39:47.381789 kernel: audit: type=1334 audit(1747305587.379:532): prog-id=60 op=UNLOAD May 15 10:39:47.387000 audit: BPF prog-id=65 op=UNLOAD May 15 10:39:47.389853 kernel: audit: type=1334 audit(1747305587.387:533): prog-id=65 op=UNLOAD May 15 10:39:47.398886 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-317fd064cb251d4a6536a47341fc7dbe52c40f9ce9bdaf895d70d8443e4d6887-rootfs.mount: Deactivated successfully. May 15 10:39:47.415172 env[1202]: time="2025-05-15T10:39:47.415093897Z" level=info msg="shim disconnected" id=317fd064cb251d4a6536a47341fc7dbe52c40f9ce9bdaf895d70d8443e4d6887 May 15 10:39:47.415172 env[1202]: time="2025-05-15T10:39:47.415167074Z" level=warning msg="cleaning up after shim disconnected" id=317fd064cb251d4a6536a47341fc7dbe52c40f9ce9bdaf895d70d8443e4d6887 namespace=k8s.io May 15 10:39:47.415474 env[1202]: time="2025-05-15T10:39:47.415194335Z" level=info msg="cleaning up dead shim" May 15 10:39:47.426945 env[1202]: time="2025-05-15T10:39:47.426869240Z" level=warning msg="cleanup warnings time=\"2025-05-15T10:39:47Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2382 runtime=io.containerd.runc.v2\n" May 15 10:39:47.427347 env[1202]: time="2025-05-15T10:39:47.427291562Z" level=info msg="TearDown network for sandbox \"317fd064cb251d4a6536a47341fc7dbe52c40f9ce9bdaf895d70d8443e4d6887\" successfully" May 15 10:39:47.427347 env[1202]: time="2025-05-15T10:39:47.427324624Z" level=info msg="StopPodSandbox for \"317fd064cb251d4a6536a47341fc7dbe52c40f9ce9bdaf895d70d8443e4d6887\" returns successfully" May 15 10:39:47.482618 kubelet[1451]: I0515 10:39:47.482535 1451 topology_manager.go:215] "Topology Admit Handler" podUID="45a8f95c-3dc9-422b-bcb7-4baccf30eaa0" podNamespace="calico-system" podName="calico-node-qnkmn" May 15 10:39:47.482618 kubelet[1451]: E0515 10:39:47.482605 1451 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="a96f0651-8968-4b81-993b-b6785afc2b65" containerName="calico-node" May 15 10:39:47.482618 kubelet[1451]: E0515 10:39:47.482614 1451 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="a96f0651-8968-4b81-993b-b6785afc2b65" containerName="calico-node" May 15 10:39:47.482618 kubelet[1451]: E0515 10:39:47.482619 1451 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="a96f0651-8968-4b81-993b-b6785afc2b65" containerName="flexvol-driver" May 15 10:39:47.482618 kubelet[1451]: E0515 10:39:47.482625 1451 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="a96f0651-8968-4b81-993b-b6785afc2b65" containerName="install-cni" May 15 10:39:47.482618 kubelet[1451]: I0515 10:39:47.482644 1451 memory_manager.go:354] "RemoveStaleState removing state" podUID="a96f0651-8968-4b81-993b-b6785afc2b65" containerName="calico-node" May 15 10:39:47.483063 kubelet[1451]: I0515 10:39:47.482651 1451 memory_manager.go:354] "RemoveStaleState removing state" podUID="a96f0651-8968-4b81-993b-b6785afc2b65" containerName="calico-node" May 15 10:39:47.483063 kubelet[1451]: I0515 10:39:47.482656 1451 memory_manager.go:354] "RemoveStaleState removing state" podUID="a96f0651-8968-4b81-993b-b6785afc2b65" containerName="calico-node" May 15 10:39:47.483063 kubelet[1451]: E0515 10:39:47.482671 1451 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="a96f0651-8968-4b81-993b-b6785afc2b65" containerName="calico-node" May 15 10:39:47.488154 systemd[1]: Created slice kubepods-besteffort-pod45a8f95c_3dc9_422b_bcb7_4baccf30eaa0.slice. May 15 10:39:47.561535 kubelet[1451]: I0515 10:39:47.561476 1451 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/a96f0651-8968-4b81-993b-b6785afc2b65-flexvol-driver-host\") pod \"a96f0651-8968-4b81-993b-b6785afc2b65\" (UID: \"a96f0651-8968-4b81-993b-b6785afc2b65\") " May 15 10:39:47.561535 kubelet[1451]: I0515 10:39:47.561493 1451 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/a96f0651-8968-4b81-993b-b6785afc2b65-flexvol-driver-host" (OuterVolumeSpecName: "flexvol-driver-host") pod "a96f0651-8968-4b81-993b-b6785afc2b65" (UID: "a96f0651-8968-4b81-993b-b6785afc2b65"). InnerVolumeSpecName "flexvol-driver-host". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 15 10:39:47.561535 kubelet[1451]: I0515 10:39:47.561525 1451 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/a96f0651-8968-4b81-993b-b6785afc2b65-cni-bin-dir\") pod \"a96f0651-8968-4b81-993b-b6785afc2b65\" (UID: \"a96f0651-8968-4b81-993b-b6785afc2b65\") " May 15 10:39:47.561535 kubelet[1451]: I0515 10:39:47.561541 1451 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/a96f0651-8968-4b81-993b-b6785afc2b65-policysync\") pod \"a96f0651-8968-4b81-993b-b6785afc2b65\" (UID: \"a96f0651-8968-4b81-993b-b6785afc2b65\") " May 15 10:39:47.561535 kubelet[1451]: I0515 10:39:47.561553 1451 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/a96f0651-8968-4b81-993b-b6785afc2b65-cni-net-dir\") pod \"a96f0651-8968-4b81-993b-b6785afc2b65\" (UID: \"a96f0651-8968-4b81-993b-b6785afc2b65\") " May 15 10:39:47.561926 kubelet[1451]: I0515 10:39:47.561562 1451 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/a96f0651-8968-4b81-993b-b6785afc2b65-cni-bin-dir" (OuterVolumeSpecName: "cni-bin-dir") pod "a96f0651-8968-4b81-993b-b6785afc2b65" (UID: "a96f0651-8968-4b81-993b-b6785afc2b65"). InnerVolumeSpecName "cni-bin-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 15 10:39:47.561926 kubelet[1451]: I0515 10:39:47.561573 1451 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/a96f0651-8968-4b81-993b-b6785afc2b65-lib-modules\") pod \"a96f0651-8968-4b81-993b-b6785afc2b65\" (UID: \"a96f0651-8968-4b81-993b-b6785afc2b65\") " May 15 10:39:47.561926 kubelet[1451]: I0515 10:39:47.561593 1451 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/a96f0651-8968-4b81-993b-b6785afc2b65-lib-modules" (OuterVolumeSpecName: "lib-modules") pod "a96f0651-8968-4b81-993b-b6785afc2b65" (UID: "a96f0651-8968-4b81-993b-b6785afc2b65"). InnerVolumeSpecName "lib-modules". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 15 10:39:47.561926 kubelet[1451]: I0515 10:39:47.561602 1451 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/a96f0651-8968-4b81-993b-b6785afc2b65-var-lib-calico\") pod \"a96f0651-8968-4b81-993b-b6785afc2b65\" (UID: \"a96f0651-8968-4b81-993b-b6785afc2b65\") " May 15 10:39:47.561926 kubelet[1451]: I0515 10:39:47.561608 1451 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/a96f0651-8968-4b81-993b-b6785afc2b65-cni-net-dir" (OuterVolumeSpecName: "cni-net-dir") pod "a96f0651-8968-4b81-993b-b6785afc2b65" (UID: "a96f0651-8968-4b81-993b-b6785afc2b65"). InnerVolumeSpecName "cni-net-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 15 10:39:47.562099 kubelet[1451]: I0515 10:39:47.561628 1451 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"kube-api-access-wmd24\" (UniqueName: \"kubernetes.io/projected/a96f0651-8968-4b81-993b-b6785afc2b65-kube-api-access-wmd24\") pod \"a96f0651-8968-4b81-993b-b6785afc2b65\" (UID: \"a96f0651-8968-4b81-993b-b6785afc2b65\") " May 15 10:39:47.562099 kubelet[1451]: I0515 10:39:47.561653 1451 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/a96f0651-8968-4b81-993b-b6785afc2b65-var-run-calico\") pod \"a96f0651-8968-4b81-993b-b6785afc2b65\" (UID: \"a96f0651-8968-4b81-993b-b6785afc2b65\") " May 15 10:39:47.562099 kubelet[1451]: I0515 10:39:47.561673 1451 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/a96f0651-8968-4b81-993b-b6785afc2b65-var-run-calico" (OuterVolumeSpecName: "var-run-calico") pod "a96f0651-8968-4b81-993b-b6785afc2b65" (UID: "a96f0651-8968-4b81-993b-b6785afc2b65"). InnerVolumeSpecName "var-run-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 15 10:39:47.562099 kubelet[1451]: I0515 10:39:47.561692 1451 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/a96f0651-8968-4b81-993b-b6785afc2b65-var-lib-calico" (OuterVolumeSpecName: "var-lib-calico") pod "a96f0651-8968-4b81-993b-b6785afc2b65" (UID: "a96f0651-8968-4b81-993b-b6785afc2b65"). InnerVolumeSpecName "var-lib-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 15 10:39:47.562099 kubelet[1451]: I0515 10:39:47.561716 1451 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/a96f0651-8968-4b81-993b-b6785afc2b65-cni-log-dir\") pod \"a96f0651-8968-4b81-993b-b6785afc2b65\" (UID: \"a96f0651-8968-4b81-993b-b6785afc2b65\") " May 15 10:39:47.562302 kubelet[1451]: I0515 10:39:47.561744 1451 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/a96f0651-8968-4b81-993b-b6785afc2b65-cni-log-dir" (OuterVolumeSpecName: "cni-log-dir") pod "a96f0651-8968-4b81-993b-b6785afc2b65" (UID: "a96f0651-8968-4b81-993b-b6785afc2b65"). InnerVolumeSpecName "cni-log-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 15 10:39:47.562302 kubelet[1451]: I0515 10:39:47.561778 1451 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/a96f0651-8968-4b81-993b-b6785afc2b65-tigera-ca-bundle\") pod \"a96f0651-8968-4b81-993b-b6785afc2b65\" (UID: \"a96f0651-8968-4b81-993b-b6785afc2b65\") " May 15 10:39:47.562302 kubelet[1451]: I0515 10:39:47.561794 1451 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/a96f0651-8968-4b81-993b-b6785afc2b65-xtables-lock\") pod \"a96f0651-8968-4b81-993b-b6785afc2b65\" (UID: \"a96f0651-8968-4b81-993b-b6785afc2b65\") " May 15 10:39:47.562302 kubelet[1451]: I0515 10:39:47.561810 1451 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/a96f0651-8968-4b81-993b-b6785afc2b65-node-certs\") pod \"a96f0651-8968-4b81-993b-b6785afc2b65\" (UID: \"a96f0651-8968-4b81-993b-b6785afc2b65\") " May 15 10:39:47.562302 kubelet[1451]: I0515 10:39:47.561870 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/45a8f95c-3dc9-422b-bcb7-4baccf30eaa0-lib-modules\") pod \"calico-node-qnkmn\" (UID: \"45a8f95c-3dc9-422b-bcb7-4baccf30eaa0\") " pod="calico-system/calico-node-qnkmn" May 15 10:39:47.562302 kubelet[1451]: I0515 10:39:47.561895 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/45a8f95c-3dc9-422b-bcb7-4baccf30eaa0-cni-bin-dir\") pod \"calico-node-qnkmn\" (UID: \"45a8f95c-3dc9-422b-bcb7-4baccf30eaa0\") " pod="calico-system/calico-node-qnkmn" May 15 10:39:47.562558 kubelet[1451]: I0515 10:39:47.561917 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/45a8f95c-3dc9-422b-bcb7-4baccf30eaa0-var-lib-calico\") pod \"calico-node-qnkmn\" (UID: \"45a8f95c-3dc9-422b-bcb7-4baccf30eaa0\") " pod="calico-system/calico-node-qnkmn" May 15 10:39:47.562558 kubelet[1451]: I0515 10:39:47.561938 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/45a8f95c-3dc9-422b-bcb7-4baccf30eaa0-cni-log-dir\") pod \"calico-node-qnkmn\" (UID: \"45a8f95c-3dc9-422b-bcb7-4baccf30eaa0\") " pod="calico-system/calico-node-qnkmn" May 15 10:39:47.562558 kubelet[1451]: I0515 10:39:47.561960 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/45a8f95c-3dc9-422b-bcb7-4baccf30eaa0-xtables-lock\") pod \"calico-node-qnkmn\" (UID: \"45a8f95c-3dc9-422b-bcb7-4baccf30eaa0\") " pod="calico-system/calico-node-qnkmn" May 15 10:39:47.562558 kubelet[1451]: I0515 10:39:47.561977 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/45a8f95c-3dc9-422b-bcb7-4baccf30eaa0-policysync\") pod \"calico-node-qnkmn\" (UID: \"45a8f95c-3dc9-422b-bcb7-4baccf30eaa0\") " pod="calico-system/calico-node-qnkmn" May 15 10:39:47.562558 kubelet[1451]: I0515 10:39:47.561996 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/45a8f95c-3dc9-422b-bcb7-4baccf30eaa0-node-certs\") pod \"calico-node-qnkmn\" (UID: \"45a8f95c-3dc9-422b-bcb7-4baccf30eaa0\") " pod="calico-system/calico-node-qnkmn" May 15 10:39:47.562753 kubelet[1451]: I0515 10:39:47.561998 1451 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/a96f0651-8968-4b81-993b-b6785afc2b65-policysync" (OuterVolumeSpecName: "policysync") pod "a96f0651-8968-4b81-993b-b6785afc2b65" (UID: "a96f0651-8968-4b81-993b-b6785afc2b65"). InnerVolumeSpecName "policysync". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 15 10:39:47.562753 kubelet[1451]: I0515 10:39:47.562014 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/45a8f95c-3dc9-422b-bcb7-4baccf30eaa0-cni-net-dir\") pod \"calico-node-qnkmn\" (UID: \"45a8f95c-3dc9-422b-bcb7-4baccf30eaa0\") " pod="calico-system/calico-node-qnkmn" May 15 10:39:47.562753 kubelet[1451]: I0515 10:39:47.562032 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/45a8f95c-3dc9-422b-bcb7-4baccf30eaa0-tigera-ca-bundle\") pod \"calico-node-qnkmn\" (UID: \"45a8f95c-3dc9-422b-bcb7-4baccf30eaa0\") " pod="calico-system/calico-node-qnkmn" May 15 10:39:47.562753 kubelet[1451]: I0515 10:39:47.562049 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/45a8f95c-3dc9-422b-bcb7-4baccf30eaa0-var-run-calico\") pod \"calico-node-qnkmn\" (UID: \"45a8f95c-3dc9-422b-bcb7-4baccf30eaa0\") " pod="calico-system/calico-node-qnkmn" May 15 10:39:47.562753 kubelet[1451]: I0515 10:39:47.562067 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/45a8f95c-3dc9-422b-bcb7-4baccf30eaa0-flexvol-driver-host\") pod \"calico-node-qnkmn\" (UID: \"45a8f95c-3dc9-422b-bcb7-4baccf30eaa0\") " pod="calico-system/calico-node-qnkmn" May 15 10:39:47.562753 kubelet[1451]: I0515 10:39:47.562113 1451 reconciler_common.go:289] "Volume detached for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/a96f0651-8968-4b81-993b-b6785afc2b65-cni-bin-dir\") on node \"10.0.0.55\" DevicePath \"\"" May 15 10:39:47.562988 kubelet[1451]: I0515 10:39:47.562140 1451 reconciler_common.go:289] "Volume detached for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/a96f0651-8968-4b81-993b-b6785afc2b65-policysync\") on node \"10.0.0.55\" DevicePath \"\"" May 15 10:39:47.562988 kubelet[1451]: I0515 10:39:47.562150 1451 reconciler_common.go:289] "Volume detached for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/a96f0651-8968-4b81-993b-b6785afc2b65-cni-net-dir\") on node \"10.0.0.55\" DevicePath \"\"" May 15 10:39:47.562988 kubelet[1451]: I0515 10:39:47.562159 1451 reconciler_common.go:289] "Volume detached for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/a96f0651-8968-4b81-993b-b6785afc2b65-var-lib-calico\") on node \"10.0.0.55\" DevicePath \"\"" May 15 10:39:47.562988 kubelet[1451]: I0515 10:39:47.562169 1451 reconciler_common.go:289] "Volume detached for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/a96f0651-8968-4b81-993b-b6785afc2b65-var-run-calico\") on node \"10.0.0.55\" DevicePath \"\"" May 15 10:39:47.562988 kubelet[1451]: I0515 10:39:47.562191 1451 reconciler_common.go:289] "Volume detached for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/a96f0651-8968-4b81-993b-b6785afc2b65-lib-modules\") on node \"10.0.0.55\" DevicePath \"\"" May 15 10:39:47.562988 kubelet[1451]: I0515 10:39:47.562303 1451 reconciler_common.go:289] "Volume detached for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/a96f0651-8968-4b81-993b-b6785afc2b65-cni-log-dir\") on node \"10.0.0.55\" DevicePath \"\"" May 15 10:39:47.562988 kubelet[1451]: I0515 10:39:47.562318 1451 reconciler_common.go:289] "Volume detached for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/a96f0651-8968-4b81-993b-b6785afc2b65-flexvol-driver-host\") on node \"10.0.0.55\" DevicePath \"\"" May 15 10:39:47.562988 kubelet[1451]: I0515 10:39:47.562227 1451 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/a96f0651-8968-4b81-993b-b6785afc2b65-xtables-lock" (OuterVolumeSpecName: "xtables-lock") pod "a96f0651-8968-4b81-993b-b6785afc2b65" (UID: "a96f0651-8968-4b81-993b-b6785afc2b65"). InnerVolumeSpecName "xtables-lock". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 15 10:39:47.564592 kubelet[1451]: I0515 10:39:47.564559 1451 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/a96f0651-8968-4b81-993b-b6785afc2b65-node-certs" (OuterVolumeSpecName: "node-certs") pod "a96f0651-8968-4b81-993b-b6785afc2b65" (UID: "a96f0651-8968-4b81-993b-b6785afc2b65"). InnerVolumeSpecName "node-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" May 15 10:39:47.564592 kubelet[1451]: I0515 10:39:47.564601 1451 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/a96f0651-8968-4b81-993b-b6785afc2b65-kube-api-access-wmd24" (OuterVolumeSpecName: "kube-api-access-wmd24") pod "a96f0651-8968-4b81-993b-b6785afc2b65" (UID: "a96f0651-8968-4b81-993b-b6785afc2b65"). InnerVolumeSpecName "kube-api-access-wmd24". PluginName "kubernetes.io/projected", VolumeGidValue "" May 15 10:39:47.566544 systemd[1]: var-lib-kubelet-pods-a96f0651\x2d8968\x2d4b81\x2d993b\x2db6785afc2b65-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dnode-1.mount: Deactivated successfully. May 15 10:39:47.566669 systemd[1]: var-lib-kubelet-pods-a96f0651\x2d8968\x2d4b81\x2d993b\x2db6785afc2b65-volumes-kubernetes.io\x7esecret-node\x2dcerts.mount: Deactivated successfully. May 15 10:39:47.566743 systemd[1]: var-lib-kubelet-pods-a96f0651\x2d8968\x2d4b81\x2d993b\x2db6785afc2b65-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dwmd24.mount: Deactivated successfully. May 15 10:39:47.569891 kubelet[1451]: I0515 10:39:47.569836 1451 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/a96f0651-8968-4b81-993b-b6785afc2b65-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "a96f0651-8968-4b81-993b-b6785afc2b65" (UID: "a96f0651-8968-4b81-993b-b6785afc2b65"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" May 15 10:39:47.662912 kubelet[1451]: I0515 10:39:47.662693 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-r8pd4\" (UniqueName: \"kubernetes.io/projected/45a8f95c-3dc9-422b-bcb7-4baccf30eaa0-kube-api-access-r8pd4\") pod \"calico-node-qnkmn\" (UID: \"45a8f95c-3dc9-422b-bcb7-4baccf30eaa0\") " pod="calico-system/calico-node-qnkmn" May 15 10:39:47.663562 kubelet[1451]: I0515 10:39:47.663542 1451 reconciler_common.go:289] "Volume detached for volume \"kube-api-access-wmd24\" (UniqueName: \"kubernetes.io/projected/a96f0651-8968-4b81-993b-b6785afc2b65-kube-api-access-wmd24\") on node \"10.0.0.55\" DevicePath \"\"" May 15 10:39:47.663666 kubelet[1451]: I0515 10:39:47.663651 1451 reconciler_common.go:289] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/a96f0651-8968-4b81-993b-b6785afc2b65-tigera-ca-bundle\") on node \"10.0.0.55\" DevicePath \"\"" May 15 10:39:47.663743 kubelet[1451]: I0515 10:39:47.663728 1451 reconciler_common.go:289] "Volume detached for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/a96f0651-8968-4b81-993b-b6785afc2b65-xtables-lock\") on node \"10.0.0.55\" DevicePath \"\"" May 15 10:39:47.663847 kubelet[1451]: I0515 10:39:47.663809 1451 reconciler_common.go:289] "Volume detached for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/a96f0651-8968-4b81-993b-b6785afc2b65-node-certs\") on node \"10.0.0.55\" DevicePath \"\"" May 15 10:39:47.790587 kubelet[1451]: E0515 10:39:47.790540 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:47.791138 env[1202]: time="2025-05-15T10:39:47.791079411Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-qnkmn,Uid:45a8f95c-3dc9-422b-bcb7-4baccf30eaa0,Namespace:calico-system,Attempt:0,}" May 15 10:39:47.803999 env[1202]: time="2025-05-15T10:39:47.803910143Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:39:47.803999 env[1202]: time="2025-05-15T10:39:47.803943245Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:39:47.803999 env[1202]: time="2025-05-15T10:39:47.803952522Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:39:47.804298 env[1202]: time="2025-05-15T10:39:47.804089649Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1efd7fb2139f8830fd40238dae5c375e10fc96ef79392d4addc13edcdf71b1ee pid=2406 runtime=io.containerd.runc.v2 May 15 10:39:47.814470 systemd[1]: Started cri-containerd-1efd7fb2139f8830fd40238dae5c375e10fc96ef79392d4addc13edcdf71b1ee.scope. May 15 10:39:47.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.830725 kernel: audit: type=1400 audit(1747305587.822:534): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.830801 kernel: audit: type=1400 audit(1747305587.822:535): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.830850 kernel: audit: type=1400 audit(1747305587.822:536): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.837965 kernel: audit: type=1400 audit(1747305587.822:537): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.838008 kernel: audit: type=1400 audit(1747305587.822:538): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.846656 kernel: audit: type=1400 audit(1747305587.822:539): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.846696 kernel: audit: type=1400 audit(1747305587.822:540): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.854240 kernel: audit: type=1400 audit(1747305587.822:541): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.825000 audit: BPF prog-id=84 op=LOAD May 15 10:39:47.826000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.826000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2406 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:47.826000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165666437666232313339663838333066643430323338646165356333 May 15 10:39:47.826000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.826000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2406 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:47.826000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165666437666232313339663838333066643430323338646165356333 May 15 10:39:47.826000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.826000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.826000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.826000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.826000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.826000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.826000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.826000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.826000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.826000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.826000 audit: BPF prog-id=85 op=LOAD May 15 10:39:47.826000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000288fa0 items=0 ppid=2406 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:47.826000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165666437666232313339663838333066643430323338646165356333 May 15 10:39:47.829000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.829000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.829000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.829000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.829000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.829000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.829000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.829000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.829000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.829000 audit: BPF prog-id=86 op=LOAD May 15 10:39:47.829000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000288fe8 items=0 ppid=2406 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:47.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165666437666232313339663838333066643430323338646165356333 May 15 10:39:47.833000 audit: BPF prog-id=86 op=UNLOAD May 15 10:39:47.833000 audit: BPF prog-id=85 op=UNLOAD May 15 10:39:47.833000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.833000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.833000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.833000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.833000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.833000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.833000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.833000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.833000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.833000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.833000 audit: BPF prog-id=87 op=LOAD May 15 10:39:47.833000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002893f8 items=0 ppid=2406 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:47.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165666437666232313339663838333066643430323338646165356333 May 15 10:39:47.861456 env[1202]: time="2025-05-15T10:39:47.861403014Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-qnkmn,Uid:45a8f95c-3dc9-422b-bcb7-4baccf30eaa0,Namespace:calico-system,Attempt:0,} returns sandbox id \"1efd7fb2139f8830fd40238dae5c375e10fc96ef79392d4addc13edcdf71b1ee\"" May 15 10:39:47.862246 kubelet[1451]: E0515 10:39:47.862218 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:47.864037 env[1202]: time="2025-05-15T10:39:47.864004400Z" level=info msg="CreateContainer within sandbox \"1efd7fb2139f8830fd40238dae5c375e10fc96ef79392d4addc13edcdf71b1ee\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 15 10:39:47.879367 env[1202]: time="2025-05-15T10:39:47.879317716Z" level=info msg="CreateContainer within sandbox \"1efd7fb2139f8830fd40238dae5c375e10fc96ef79392d4addc13edcdf71b1ee\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"dbeb4d87c4971fe90c42dead4e9c3baa6c0faea9154acc6c013c7a1bb1b8cc55\"" May 15 10:39:47.879780 env[1202]: time="2025-05-15T10:39:47.879759233Z" level=info msg="StartContainer for \"dbeb4d87c4971fe90c42dead4e9c3baa6c0faea9154acc6c013c7a1bb1b8cc55\"" May 15 10:39:47.893415 systemd[1]: Started cri-containerd-dbeb4d87c4971fe90c42dead4e9c3baa6c0faea9154acc6c013c7a1bb1b8cc55.scope. May 15 10:39:47.906000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.906000 audit[2445]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f7160282ba8 items=0 ppid=2406 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:47.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462656234643837633439373166653930633432646561643465396333 May 15 10:39:47.906000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.906000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.906000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.906000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.906000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.906000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.906000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.906000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.906000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.906000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.906000 audit: BPF prog-id=88 op=LOAD May 15 10:39:47.906000 audit[2445]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000308db8 items=0 ppid=2406 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:47.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462656234643837633439373166653930633432646561643465396333 May 15 10:39:47.906000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.906000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.906000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.906000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.906000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.906000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.906000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.906000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.906000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.906000 audit: BPF prog-id=89 op=LOAD May 15 10:39:47.906000 audit[2445]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000308e08 items=0 ppid=2406 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:47.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462656234643837633439373166653930633432646561643465396333 May 15 10:39:47.906000 audit: BPF prog-id=89 op=UNLOAD May 15 10:39:47.906000 audit: BPF prog-id=88 op=UNLOAD May 15 10:39:47.906000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.906000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.906000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.906000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.906000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.906000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.906000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.906000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.906000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.906000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.906000 audit: BPF prog-id=90 op=LOAD May 15 10:39:47.906000 audit[2445]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000308e98 items=0 ppid=2406 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:47.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462656234643837633439373166653930633432646561643465396333 May 15 10:39:47.927699 systemd[1]: cri-containerd-dbeb4d87c4971fe90c42dead4e9c3baa6c0faea9154acc6c013c7a1bb1b8cc55.scope: Deactivated successfully. May 15 10:39:47.932000 audit: BPF prog-id=90 op=UNLOAD May 15 10:39:47.966316 env[1202]: time="2025-05-15T10:39:47.966238390Z" level=info msg="StartContainer for \"dbeb4d87c4971fe90c42dead4e9c3baa6c0faea9154acc6c013c7a1bb1b8cc55\" returns successfully" May 15 10:39:47.996185 env[1202]: time="2025-05-15T10:39:47.996129282Z" level=info msg="shim disconnected" id=dbeb4d87c4971fe90c42dead4e9c3baa6c0faea9154acc6c013c7a1bb1b8cc55 May 15 10:39:47.996185 env[1202]: time="2025-05-15T10:39:47.996178805Z" level=warning msg="cleaning up after shim disconnected" id=dbeb4d87c4971fe90c42dead4e9c3baa6c0faea9154acc6c013c7a1bb1b8cc55 namespace=k8s.io May 15 10:39:47.996185 env[1202]: time="2025-05-15T10:39:47.996187381Z" level=info msg="cleaning up dead shim" May 15 10:39:47.997021 systemd[1]: Removed slice kubepods-besteffort-poda96f0651_8968_4b81_993b_b6785afc2b65.slice. May 15 10:39:47.997118 systemd[1]: kubepods-besteffort-poda96f0651_8968_4b81_993b_b6785afc2b65.slice: Consumed 2.021s CPU time. May 15 10:39:48.002501 env[1202]: time="2025-05-15T10:39:48.002456061Z" level=warning msg="cleanup warnings time=\"2025-05-15T10:39:47Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2483 runtime=io.containerd.runc.v2\n" May 15 10:39:48.047533 kubelet[1451]: E0515 10:39:48.047448 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:48.273914 kubelet[1451]: I0515 10:39:48.273736 1451 scope.go:117] "RemoveContainer" containerID="e6afa52d90c2dd1242e116ab8422fd46f507bf936e62d710bee25fd9a6bb4815" May 15 10:39:48.275783 env[1202]: time="2025-05-15T10:39:48.274980479Z" level=info msg="RemoveContainer for \"e6afa52d90c2dd1242e116ab8422fd46f507bf936e62d710bee25fd9a6bb4815\"" May 15 10:39:48.275896 kubelet[1451]: E0515 10:39:48.275281 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:48.277381 env[1202]: time="2025-05-15T10:39:48.277344861Z" level=info msg="CreateContainer within sandbox \"1efd7fb2139f8830fd40238dae5c375e10fc96ef79392d4addc13edcdf71b1ee\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 15 10:39:48.287122 env[1202]: time="2025-05-15T10:39:48.287067817Z" level=info msg="RemoveContainer for \"e6afa52d90c2dd1242e116ab8422fd46f507bf936e62d710bee25fd9a6bb4815\" returns successfully" May 15 10:39:48.287482 kubelet[1451]: I0515 10:39:48.287441 1451 scope.go:117] "RemoveContainer" containerID="a48a4f1f3439df2e3dbd54edfe6f57f18b322c2e21ea4cee3c37e8107ecfe56d" May 15 10:39:48.288901 env[1202]: time="2025-05-15T10:39:48.288851611Z" level=info msg="RemoveContainer for \"a48a4f1f3439df2e3dbd54edfe6f57f18b322c2e21ea4cee3c37e8107ecfe56d\"" May 15 10:39:48.295217 env[1202]: time="2025-05-15T10:39:48.295125271Z" level=info msg="RemoveContainer for \"a48a4f1f3439df2e3dbd54edfe6f57f18b322c2e21ea4cee3c37e8107ecfe56d\" returns successfully" May 15 10:39:48.295470 kubelet[1451]: I0515 10:39:48.295431 1451 scope.go:117] "RemoveContainer" containerID="90a7b727c0312e880119abc17fc0084a2d47237ee9cc7f795ed9a41f8963a327" May 15 10:39:48.296866 env[1202]: time="2025-05-15T10:39:48.296826711Z" level=info msg="RemoveContainer for \"90a7b727c0312e880119abc17fc0084a2d47237ee9cc7f795ed9a41f8963a327\"" May 15 10:39:48.300049 env[1202]: time="2025-05-15T10:39:48.299990702Z" level=info msg="RemoveContainer for \"90a7b727c0312e880119abc17fc0084a2d47237ee9cc7f795ed9a41f8963a327\" returns successfully" May 15 10:39:48.305462 env[1202]: time="2025-05-15T10:39:48.305391797Z" level=info msg="CreateContainer within sandbox \"1efd7fb2139f8830fd40238dae5c375e10fc96ef79392d4addc13edcdf71b1ee\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"324db24af8ecc5b34efcbcf7270a644c97b36aa14030ee8bb4576035c9c34547\"" May 15 10:39:48.306033 env[1202]: time="2025-05-15T10:39:48.305957337Z" level=info msg="StartContainer for \"324db24af8ecc5b34efcbcf7270a644c97b36aa14030ee8bb4576035c9c34547\"" May 15 10:39:48.324041 systemd[1]: Started cri-containerd-324db24af8ecc5b34efcbcf7270a644c97b36aa14030ee8bb4576035c9c34547.scope. May 15 10:39:48.336000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.336000 audit[2502]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7efcb5fcf688 items=0 ppid=2406 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:48.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332346462323461663865636335623334656663626366373237306136 May 15 10:39:48.337000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.337000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.337000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.337000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.337000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.337000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.337000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.337000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.337000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.337000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.337000 audit: BPF prog-id=91 op=LOAD May 15 10:39:48.337000 audit[2502]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00022ec78 items=0 ppid=2406 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:48.337000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332346462323461663865636335623334656663626366373237306136 May 15 10:39:48.337000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.337000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.337000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.337000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.337000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.337000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.337000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.337000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.337000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.337000 audit: BPF prog-id=92 op=LOAD May 15 10:39:48.337000 audit[2502]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00022ecc8 items=0 ppid=2406 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:48.337000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332346462323461663865636335623334656663626366373237306136 May 15 10:39:48.337000 audit: BPF prog-id=92 op=UNLOAD May 15 10:39:48.337000 audit: BPF prog-id=91 op=UNLOAD May 15 10:39:48.337000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.337000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.337000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.337000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.337000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.337000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.337000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.337000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.337000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.337000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.337000 audit: BPF prog-id=93 op=LOAD May 15 10:39:48.337000 audit[2502]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00022ed58 items=0 ppid=2406 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:48.337000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332346462323461663865636335623334656663626366373237306136 May 15 10:39:48.351405 env[1202]: time="2025-05-15T10:39:48.351322857Z" level=info msg="StartContainer for \"324db24af8ecc5b34efcbcf7270a644c97b36aa14030ee8bb4576035c9c34547\" returns successfully" May 15 10:39:48.625084 systemd[1]: cri-containerd-324db24af8ecc5b34efcbcf7270a644c97b36aa14030ee8bb4576035c9c34547.scope: Deactivated successfully. May 15 10:39:48.629000 audit: BPF prog-id=93 op=UNLOAD May 15 10:39:48.643904 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-324db24af8ecc5b34efcbcf7270a644c97b36aa14030ee8bb4576035c9c34547-rootfs.mount: Deactivated successfully. May 15 10:39:48.663375 env[1202]: time="2025-05-15T10:39:48.663325535Z" level=info msg="shim disconnected" id=324db24af8ecc5b34efcbcf7270a644c97b36aa14030ee8bb4576035c9c34547 May 15 10:39:48.663648 env[1202]: time="2025-05-15T10:39:48.663615539Z" level=warning msg="cleaning up after shim disconnected" id=324db24af8ecc5b34efcbcf7270a644c97b36aa14030ee8bb4576035c9c34547 namespace=k8s.io May 15 10:39:48.663648 env[1202]: time="2025-05-15T10:39:48.663635877Z" level=info msg="cleaning up dead shim" May 15 10:39:48.669779 env[1202]: time="2025-05-15T10:39:48.669749067Z" level=warning msg="cleanup warnings time=\"2025-05-15T10:39:48Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2547 runtime=io.containerd.runc.v2\n" May 15 10:39:49.047973 kubelet[1451]: E0515 10:39:49.047794 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:49.278939 kubelet[1451]: E0515 10:39:49.278904 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:49.287213 env[1202]: time="2025-05-15T10:39:49.286103942Z" level=info msg="CreateContainer within sandbox \"1efd7fb2139f8830fd40238dae5c375e10fc96ef79392d4addc13edcdf71b1ee\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 15 10:39:49.302118 env[1202]: time="2025-05-15T10:39:49.302018755Z" level=info msg="CreateContainer within sandbox \"1efd7fb2139f8830fd40238dae5c375e10fc96ef79392d4addc13edcdf71b1ee\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"bd639183a6cf7045f2e81d6790be3ae0cb1d1b3ecb9cfe8e2906a019eed9f849\"" May 15 10:39:49.302619 env[1202]: time="2025-05-15T10:39:49.302594665Z" level=info msg="StartContainer for \"bd639183a6cf7045f2e81d6790be3ae0cb1d1b3ecb9cfe8e2906a019eed9f849\"" May 15 10:39:49.320917 systemd[1]: Started cri-containerd-bd639183a6cf7045f2e81d6790be3ae0cb1d1b3ecb9cfe8e2906a019eed9f849.scope. May 15 10:39:49.338000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.338000 audit[2569]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fd3c56c1b58 items=0 ppid=2406 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:49.338000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264363339313833613663663730343566326538316436373930626533 May 15 10:39:49.338000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.338000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.338000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.338000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.338000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.338000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.338000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.338000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.338000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.338000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.338000 audit: BPF prog-id=94 op=LOAD May 15 10:39:49.338000 audit[2569]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002cbba8 items=0 ppid=2406 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:49.338000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264363339313833613663663730343566326538316436373930626533 May 15 10:39:49.339000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.339000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.339000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.339000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.339000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.339000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.339000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.339000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.339000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.339000 audit: BPF prog-id=95 op=LOAD May 15 10:39:49.339000 audit[2569]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002cbbf8 items=0 ppid=2406 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:49.339000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264363339313833613663663730343566326538316436373930626533 May 15 10:39:49.339000 audit: BPF prog-id=95 op=UNLOAD May 15 10:39:49.339000 audit: BPF prog-id=94 op=UNLOAD May 15 10:39:49.339000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.339000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.339000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.339000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.339000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.339000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.339000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.339000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.339000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.339000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.339000 audit: BPF prog-id=96 op=LOAD May 15 10:39:49.339000 audit[2569]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0002cbc88 items=0 ppid=2406 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:49.339000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264363339313833613663663730343566326538316436373930626533 May 15 10:39:49.353149 env[1202]: time="2025-05-15T10:39:49.353088100Z" level=info msg="StartContainer for \"bd639183a6cf7045f2e81d6790be3ae0cb1d1b3ecb9cfe8e2906a019eed9f849\" returns successfully" May 15 10:39:49.991980 kubelet[1451]: I0515 10:39:49.991930 1451 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="a96f0651-8968-4b81-993b-b6785afc2b65" path="/var/lib/kubelet/pods/a96f0651-8968-4b81-993b-b6785afc2b65/volumes" May 15 10:39:50.048221 kubelet[1451]: E0515 10:39:50.048138 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:50.285005 kubelet[1451]: E0515 10:39:50.284871 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:50.601000 audit[2686]: AVC avc: denied { write } for pid=2686 comm="tee" name="fd" dev="proc" ino=19326 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:39:50.601000 audit[2686]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffde4380a2b a2=241 a3=1b6 items=1 ppid=2652 pid=2686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.601000 audit: CWD cwd="/etc/service/enabled/bird/log" May 15 10:39:50.601000 audit: PATH item=0 name="/dev/fd/63" inode=19322 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:50.601000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:39:50.603000 audit[2702]: AVC avc: denied { write } for pid=2702 comm="tee" name="fd" dev="proc" ino=21206 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:39:50.603000 audit[2702]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc1e668a2a a2=241 a3=1b6 items=1 ppid=2658 pid=2702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.603000 audit: CWD cwd="/etc/service/enabled/felix/log" May 15 10:39:50.603000 audit: PATH item=0 name="/dev/fd/63" inode=20342 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:50.603000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:39:50.607000 audit[2689]: AVC avc: denied { write } for pid=2689 comm="tee" name="fd" dev="proc" ino=21617 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:39:50.607000 audit[2689]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc9a97da1b a2=241 a3=1b6 items=1 ppid=2653 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.607000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 15 10:39:50.607000 audit: PATH item=0 name="/dev/fd/63" inode=20340 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:50.607000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:39:50.621000 audit[2698]: AVC avc: denied { write } for pid=2698 comm="tee" name="fd" dev="proc" ino=20347 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:39:50.621000 audit[2698]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff2eadea2c a2=241 a3=1b6 items=1 ppid=2662 pid=2698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.621000 audit: CWD cwd="/etc/service/enabled/cni/log" May 15 10:39:50.621000 audit: PATH item=0 name="/dev/fd/63" inode=21201 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:50.621000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:39:50.626000 audit[2729]: AVC avc: denied { write } for pid=2729 comm="tee" name="fd" dev="proc" ino=21219 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:39:50.626000 audit[2729]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc82160a1a a2=241 a3=1b6 items=1 ppid=2661 pid=2729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.626000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 15 10:39:50.626000 audit: PATH item=0 name="/dev/fd/63" inode=20351 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:50.626000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:39:50.630000 audit[2723]: AVC avc: denied { write } for pid=2723 comm="tee" name="fd" dev="proc" ino=21223 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:39:50.630000 audit[2723]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdd6991a2a a2=241 a3=1b6 items=1 ppid=2667 pid=2723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.630000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 15 10:39:50.630000 audit: PATH item=0 name="/dev/fd/63" inode=21216 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:50.630000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:39:50.637000 audit[2719]: AVC avc: denied { write } for pid=2719 comm="tee" name="fd" dev="proc" ino=21227 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:39:50.637000 audit[2719]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdeff0fa2a a2=241 a3=1b6 items=1 ppid=2654 pid=2719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.637000 audit: CWD cwd="/etc/service/enabled/confd/log" May 15 10:39:50.637000 audit: PATH item=0 name="/dev/fd/63" inode=19330 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:50.637000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:39:50.709000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.709000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.709000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.709000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.709000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.709000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.709000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.709000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.709000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.709000 audit: BPF prog-id=97 op=LOAD May 15 10:39:50.709000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe9c66cb10 a2=98 a3=3 items=0 ppid=2660 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.709000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:50.709000 audit: BPF prog-id=97 op=UNLOAD May 15 10:39:50.709000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.709000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.709000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.709000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.709000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.709000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.709000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.709000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.709000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.709000 audit: BPF prog-id=98 op=LOAD May 15 10:39:50.709000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe9c66c8f0 a2=74 a3=540051 items=0 ppid=2660 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.709000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:50.709000 audit: BPF prog-id=98 op=UNLOAD May 15 10:39:50.709000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.709000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.709000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.709000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.709000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.709000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.709000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.709000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.709000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.709000 audit: BPF prog-id=99 op=LOAD May 15 10:39:50.709000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe9c66c920 a2=94 a3=2 items=0 ppid=2660 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.709000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:50.709000 audit: BPF prog-id=99 op=UNLOAD May 15 10:39:50.811000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.811000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.811000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.811000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.811000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.811000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.811000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.811000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.811000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.811000 audit: BPF prog-id=100 op=LOAD May 15 10:39:50.811000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe9c66c7e0 a2=40 a3=1 items=0 ppid=2660 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.811000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:50.812000 audit: BPF prog-id=100 op=UNLOAD May 15 10:39:50.812000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.812000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe9c66c8b0 a2=50 a3=7ffe9c66c990 items=0 ppid=2660 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.812000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:50.819000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.819000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe9c66c7f0 a2=28 a3=0 items=0 ppid=2660 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.819000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:50.819000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.819000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe9c66c820 a2=28 a3=0 items=0 ppid=2660 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.819000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:50.819000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.819000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe9c66c730 a2=28 a3=0 items=0 ppid=2660 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.819000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:50.819000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.819000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe9c66c840 a2=28 a3=0 items=0 ppid=2660 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.819000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:50.819000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.819000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe9c66c820 a2=28 a3=0 items=0 ppid=2660 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.819000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:50.819000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.819000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe9c66c810 a2=28 a3=0 items=0 ppid=2660 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.819000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:50.819000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.819000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe9c66c840 a2=28 a3=0 items=0 ppid=2660 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.819000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:50.819000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.819000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe9c66c820 a2=28 a3=0 items=0 ppid=2660 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.819000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:50.819000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.819000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe9c66c840 a2=28 a3=0 items=0 ppid=2660 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.819000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:50.819000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.819000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe9c66c810 a2=28 a3=0 items=0 ppid=2660 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.819000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:50.819000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.819000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe9c66c880 a2=28 a3=0 items=0 ppid=2660 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.819000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:50.819000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.819000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe9c66c630 a2=50 a3=1 items=0 ppid=2660 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.819000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:50.819000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.819000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.819000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.819000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.819000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.819000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.819000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.819000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.819000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.819000 audit: BPF prog-id=101 op=LOAD May 15 10:39:50.819000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe9c66c630 a2=94 a3=5 items=0 ppid=2660 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.819000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:50.819000 audit: BPF prog-id=101 op=UNLOAD May 15 10:39:50.819000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.819000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe9c66c6e0 a2=50 a3=1 items=0 ppid=2660 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.819000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:50.819000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.819000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe9c66c800 a2=4 a3=38 items=0 ppid=2660 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.819000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:50.819000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.819000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.819000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.819000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.819000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.819000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.819000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.819000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.819000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.819000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.819000 audit[2771]: AVC avc: denied { confidentiality } for pid=2771 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:39:50.819000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe9c66c850 a2=94 a3=6 items=0 ppid=2660 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.819000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:50.820000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.820000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.820000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.820000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.820000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.820000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.820000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.820000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.820000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.820000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.820000 audit[2771]: AVC avc: denied { confidentiality } for pid=2771 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:39:50.820000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe9c66c000 a2=94 a3=83 items=0 ppid=2660 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.820000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:50.820000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.820000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.820000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.820000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.820000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.820000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.820000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.820000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.820000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.820000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.820000 audit[2771]: AVC avc: denied { confidentiality } for pid=2771 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:39:50.820000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe9c66c000 a2=94 a3=83 items=0 ppid=2660 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.820000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:50.826000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.826000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.826000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.826000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.826000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.826000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.826000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.826000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.826000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.826000 audit: BPF prog-id=102 op=LOAD May 15 10:39:50.826000 audit[2774]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff0834f230 a2=98 a3=1999999999999999 items=0 ppid=2660 pid=2774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.826000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 10:39:50.826000 audit: BPF prog-id=102 op=UNLOAD May 15 10:39:50.826000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.826000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.826000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.826000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.826000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.826000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.826000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.826000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.826000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.826000 audit: BPF prog-id=103 op=LOAD May 15 10:39:50.826000 audit[2774]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff0834f110 a2=74 a3=ffff items=0 ppid=2660 pid=2774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.826000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 10:39:50.826000 audit: BPF prog-id=103 op=UNLOAD May 15 10:39:50.826000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.826000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.826000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.826000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.826000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.826000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.826000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.826000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.826000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.826000 audit: BPF prog-id=104 op=LOAD May 15 10:39:50.826000 audit[2774]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff0834f150 a2=40 a3=7fff0834f330 items=0 ppid=2660 pid=2774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.826000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 10:39:50.826000 audit: BPF prog-id=104 op=UNLOAD May 15 10:39:50.864984 systemd-networkd[1020]: vxlan.calico: Link UP May 15 10:39:50.864992 systemd-networkd[1020]: vxlan.calico: Gained carrier May 15 10:39:50.894000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.894000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.894000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.894000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.894000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.894000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.894000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.894000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.894000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.894000 audit: BPF prog-id=105 op=LOAD May 15 10:39:50.894000 audit[2802]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe83896160 a2=98 a3=ffffffff items=0 ppid=2660 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.894000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:50.894000 audit: BPF prog-id=105 op=UNLOAD May 15 10:39:50.894000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.894000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.894000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.894000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.894000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.894000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.894000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.894000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.894000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.894000 audit: BPF prog-id=106 op=LOAD May 15 10:39:50.894000 audit[2802]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe83895f70 a2=74 a3=540051 items=0 ppid=2660 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.894000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:50.894000 audit: BPF prog-id=106 op=UNLOAD May 15 10:39:50.894000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.894000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.894000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.894000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.894000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.894000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.894000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.894000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.894000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.894000 audit: BPF prog-id=107 op=LOAD May 15 10:39:50.894000 audit[2802]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe83895fa0 a2=94 a3=2 items=0 ppid=2660 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.894000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:50.894000 audit: BPF prog-id=107 op=UNLOAD May 15 10:39:50.894000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.894000 audit[2802]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe83895e70 a2=28 a3=0 items=0 ppid=2660 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.894000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:50.894000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.894000 audit[2802]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe83895ea0 a2=28 a3=0 items=0 ppid=2660 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.894000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:50.894000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.894000 audit[2802]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe83895db0 a2=28 a3=0 items=0 ppid=2660 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.894000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:50.894000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.894000 audit[2802]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe83895ec0 a2=28 a3=0 items=0 ppid=2660 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.894000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:50.894000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.894000 audit[2802]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe83895ea0 a2=28 a3=0 items=0 ppid=2660 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.894000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:50.894000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.894000 audit[2802]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe83895e90 a2=28 a3=0 items=0 ppid=2660 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.894000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:50.894000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.894000 audit[2802]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe83895ec0 a2=28 a3=0 items=0 ppid=2660 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.894000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:50.894000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.894000 audit[2802]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe83895ea0 a2=28 a3=0 items=0 ppid=2660 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.894000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:50.894000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.894000 audit[2802]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe83895ec0 a2=28 a3=0 items=0 ppid=2660 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.894000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:50.894000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.894000 audit[2802]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe83895e90 a2=28 a3=0 items=0 ppid=2660 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.894000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:50.894000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.894000 audit[2802]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe83895f00 a2=28 a3=0 items=0 ppid=2660 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.894000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:50.894000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.894000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.894000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.894000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.894000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.894000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.894000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.894000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.894000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.894000 audit: BPF prog-id=108 op=LOAD May 15 10:39:50.894000 audit[2802]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe83895d70 a2=40 a3=0 items=0 ppid=2660 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.894000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:50.894000 audit: BPF prog-id=108 op=UNLOAD May 15 10:39:50.895000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.895000 audit[2802]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffe83895d60 a2=50 a3=2800 items=0 ppid=2660 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.895000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:50.895000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.895000 audit[2802]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffe83895d60 a2=50 a3=2800 items=0 ppid=2660 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.895000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:50.895000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.895000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.895000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.895000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.895000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.895000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.895000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.895000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.895000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.895000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.895000 audit: BPF prog-id=109 op=LOAD May 15 10:39:50.895000 audit[2802]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe83895580 a2=94 a3=2 items=0 ppid=2660 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.895000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:50.895000 audit: BPF prog-id=109 op=UNLOAD May 15 10:39:50.895000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.895000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.895000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.895000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.895000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.895000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.895000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.895000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.895000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.895000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.895000 audit: BPF prog-id=110 op=LOAD May 15 10:39:50.895000 audit[2802]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe83895680 a2=94 a3=30 items=0 ppid=2660 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.895000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:50.903000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.903000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.903000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.903000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.903000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.903000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.903000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.903000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.903000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.903000 audit: BPF prog-id=111 op=LOAD May 15 10:39:50.903000 audit[2806]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc21b93a10 a2=98 a3=0 items=0 ppid=2660 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.903000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:50.903000 audit: BPF prog-id=111 op=UNLOAD May 15 10:39:50.903000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.903000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.903000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.903000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.903000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.903000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.903000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.903000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.903000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.903000 audit: BPF prog-id=112 op=LOAD May 15 10:39:50.903000 audit[2806]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc21b937f0 a2=74 a3=540051 items=0 ppid=2660 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.903000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:50.903000 audit: BPF prog-id=112 op=UNLOAD May 15 10:39:50.903000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.903000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.903000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.903000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.903000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.903000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.903000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.903000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.903000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.903000 audit: BPF prog-id=113 op=LOAD May 15 10:39:50.903000 audit[2806]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc21b93820 a2=94 a3=2 items=0 ppid=2660 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.903000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:50.903000 audit: BPF prog-id=113 op=UNLOAD May 15 10:39:51.002196 kubelet[1451]: E0515 10:39:51.002144 1451 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:51.026000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.026000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.026000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.026000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.026000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.026000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.026000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.026000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.026000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.026000 audit: BPF prog-id=114 op=LOAD May 15 10:39:51.026000 audit[2806]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc21b936e0 a2=40 a3=1 items=0 ppid=2660 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.026000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:51.026000 audit: BPF prog-id=114 op=UNLOAD May 15 10:39:51.026000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.026000 audit[2806]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc21b937b0 a2=50 a3=7ffc21b93890 items=0 ppid=2660 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.026000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:51.034000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.034000 audit[2806]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc21b936f0 a2=28 a3=0 items=0 ppid=2660 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.034000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:51.034000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.034000 audit[2806]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc21b93720 a2=28 a3=0 items=0 ppid=2660 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.034000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:51.034000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.034000 audit[2806]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc21b93630 a2=28 a3=0 items=0 ppid=2660 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.034000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:51.034000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.034000 audit[2806]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc21b93740 a2=28 a3=0 items=0 ppid=2660 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.034000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:51.034000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.034000 audit[2806]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc21b93720 a2=28 a3=0 items=0 ppid=2660 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.034000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:51.034000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.034000 audit[2806]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc21b93710 a2=28 a3=0 items=0 ppid=2660 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.034000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:51.034000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.034000 audit[2806]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc21b93740 a2=28 a3=0 items=0 ppid=2660 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.034000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:51.034000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.034000 audit[2806]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc21b93720 a2=28 a3=0 items=0 ppid=2660 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.034000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:51.034000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.034000 audit[2806]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc21b93740 a2=28 a3=0 items=0 ppid=2660 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.034000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:51.034000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.034000 audit[2806]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc21b93710 a2=28 a3=0 items=0 ppid=2660 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.034000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:51.034000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.034000 audit[2806]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc21b93780 a2=28 a3=0 items=0 ppid=2660 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.034000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:51.034000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.034000 audit[2806]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc21b93530 a2=50 a3=1 items=0 ppid=2660 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.034000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:51.034000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.034000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.034000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.034000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.034000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.034000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.034000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.034000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.034000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.034000 audit: BPF prog-id=115 op=LOAD May 15 10:39:51.034000 audit[2806]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc21b93530 a2=94 a3=5 items=0 ppid=2660 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.034000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:51.035000 audit: BPF prog-id=115 op=UNLOAD May 15 10:39:51.035000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.035000 audit[2806]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc21b935e0 a2=50 a3=1 items=0 ppid=2660 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.035000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:51.035000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.035000 audit[2806]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc21b93700 a2=4 a3=38 items=0 ppid=2660 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.035000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:51.035000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.035000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.035000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.035000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.035000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.035000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.035000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.035000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.035000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.035000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.035000 audit[2806]: AVC avc: denied { confidentiality } for pid=2806 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:39:51.035000 audit[2806]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc21b93750 a2=94 a3=6 items=0 ppid=2660 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.035000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:51.035000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.035000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.035000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.035000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.035000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.035000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.035000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.035000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.035000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.035000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.035000 audit[2806]: AVC avc: denied { confidentiality } for pid=2806 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:39:51.035000 audit[2806]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc21b92f00 a2=94 a3=83 items=0 ppid=2660 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.035000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:51.035000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.035000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.035000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.035000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.035000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.035000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.035000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.035000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.035000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.035000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.035000 audit[2806]: AVC avc: denied { confidentiality } for pid=2806 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:39:51.035000 audit[2806]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc21b92f00 a2=94 a3=83 items=0 ppid=2660 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.035000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:51.036000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.036000 audit[2806]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc21b94940 a2=10 a3=208 items=0 ppid=2660 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.036000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:51.036000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.036000 audit[2806]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc21b947e0 a2=10 a3=3 items=0 ppid=2660 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.036000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:51.036000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.036000 audit[2806]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc21b94780 a2=10 a3=3 items=0 ppid=2660 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.036000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:51.036000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.036000 audit[2806]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc21b94780 a2=10 a3=7 items=0 ppid=2660 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.036000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:51.043299 env[1202]: time="2025-05-15T10:39:51.043260389Z" level=info msg="StopPodSandbox for \"317fd064cb251d4a6536a47341fc7dbe52c40f9ce9bdaf895d70d8443e4d6887\"" May 15 10:39:51.043584 env[1202]: time="2025-05-15T10:39:51.043347983Z" level=info msg="TearDown network for sandbox \"317fd064cb251d4a6536a47341fc7dbe52c40f9ce9bdaf895d70d8443e4d6887\" successfully" May 15 10:39:51.043584 env[1202]: time="2025-05-15T10:39:51.043389220Z" level=info msg="StopPodSandbox for \"317fd064cb251d4a6536a47341fc7dbe52c40f9ce9bdaf895d70d8443e4d6887\" returns successfully" May 15 10:39:51.043940 env[1202]: time="2025-05-15T10:39:51.043905207Z" level=info msg="RemovePodSandbox for \"317fd064cb251d4a6536a47341fc7dbe52c40f9ce9bdaf895d70d8443e4d6887\"" May 15 10:39:51.043993 env[1202]: time="2025-05-15T10:39:51.043949290Z" level=info msg="Forcibly stopping sandbox \"317fd064cb251d4a6536a47341fc7dbe52c40f9ce9bdaf895d70d8443e4d6887\"" May 15 10:39:51.044053 env[1202]: time="2025-05-15T10:39:51.044032676Z" level=info msg="TearDown network for sandbox \"317fd064cb251d4a6536a47341fc7dbe52c40f9ce9bdaf895d70d8443e4d6887\" successfully" May 15 10:39:51.045000 audit: BPF prog-id=110 op=UNLOAD May 15 10:39:51.048949 kubelet[1451]: E0515 10:39:51.048922 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:51.053241 env[1202]: time="2025-05-15T10:39:51.053212576Z" level=info msg="RemovePodSandbox \"317fd064cb251d4a6536a47341fc7dbe52c40f9ce9bdaf895d70d8443e4d6887\" returns successfully" May 15 10:39:51.087000 audit[2832]: NETFILTER_CFG table=mangle:67 family=2 entries=16 op=nft_register_chain pid=2832 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:39:51.087000 audit[2832]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffd26bb9710 a2=0 a3=7ffd26bb96fc items=0 ppid=2660 pid=2832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.087000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:39:51.098000 audit[2834]: NETFILTER_CFG table=filter:68 family=2 entries=39 op=nft_register_chain pid=2834 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:39:51.098000 audit[2834]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffff673e930 a2=0 a3=7ffff673e91c items=0 ppid=2660 pid=2834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.098000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:39:51.099000 audit[2837]: NETFILTER_CFG table=nat:69 family=2 entries=15 op=nft_register_chain pid=2837 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:39:51.099000 audit[2837]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffe93d80930 a2=0 a3=7ffe93d8091c items=0 ppid=2660 pid=2837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.099000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:39:51.100000 audit[2833]: NETFILTER_CFG table=raw:70 family=2 entries=21 op=nft_register_chain pid=2833 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:39:51.100000 audit[2833]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffd8e6513d0 a2=0 a3=7ffd8e6513bc items=0 ppid=2660 pid=2833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.100000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:39:51.286717 kubelet[1451]: E0515 10:39:51.286586 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:52.049957 kubelet[1451]: E0515 10:39:52.049879 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:52.524990 systemd-networkd[1020]: vxlan.calico: Gained IPv6LL May 15 10:39:53.050347 kubelet[1451]: E0515 10:39:53.050278 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:53.302000 audit[2873]: NETFILTER_CFG table=filter:71 family=2 entries=16 op=nft_register_rule pid=2873 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:53.304031 kernel: kauditd_printk_skb: 695 callbacks suppressed May 15 10:39:53.304100 kernel: audit: type=1325 audit(1747305593.302:674): table=filter:71 family=2 entries=16 op=nft_register_rule pid=2873 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:53.302000 audit[2873]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff899256a0 a2=0 a3=7fff8992568c items=0 ppid=1729 pid=2873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:53.311730 kernel: audit: type=1300 audit(1747305593.302:674): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff899256a0 a2=0 a3=7fff8992568c items=0 ppid=1729 pid=2873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:53.311765 kernel: audit: type=1327 audit(1747305593.302:674): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:53.302000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:53.314000 audit[2873]: NETFILTER_CFG table=nat:72 family=2 entries=14 op=nft_register_rule pid=2873 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:53.314000 audit[2873]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fff899256a0 a2=0 a3=0 items=0 ppid=1729 pid=2873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:53.322413 kernel: audit: type=1325 audit(1747305593.314:675): table=nat:72 family=2 entries=14 op=nft_register_rule pid=2873 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:53.322540 kernel: audit: type=1300 audit(1747305593.314:675): arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fff899256a0 a2=0 a3=0 items=0 ppid=1729 pid=2873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:53.322567 kernel: audit: type=1327 audit(1747305593.314:675): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:53.314000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:53.333000 audit[2876]: NETFILTER_CFG table=filter:73 family=2 entries=13 op=nft_register_rule pid=2876 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:53.333000 audit[2876]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff2692c380 a2=0 a3=7fff2692c36c items=0 ppid=1729 pid=2876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:53.341614 kernel: audit: type=1325 audit(1747305593.333:676): table=filter:73 family=2 entries=13 op=nft_register_rule pid=2876 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:53.341658 kernel: audit: type=1300 audit(1747305593.333:676): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff2692c380 a2=0 a3=7fff2692c36c items=0 ppid=1729 pid=2876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:53.341682 kernel: audit: type=1327 audit(1747305593.333:676): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:53.333000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:53.344000 audit[2876]: NETFILTER_CFG table=nat:74 family=2 entries=35 op=nft_register_chain pid=2876 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:53.344000 audit[2876]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7fff2692c380 a2=0 a3=7fff2692c36c items=0 ppid=1729 pid=2876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:53.344000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:53.348842 kernel: audit: type=1325 audit(1747305593.344:677): table=nat:74 family=2 entries=35 op=nft_register_chain pid=2876 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:54.051230 kubelet[1451]: E0515 10:39:54.051186 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:55.051934 kubelet[1451]: E0515 10:39:55.051883 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:55.305000 audit[2880]: NETFILTER_CFG table=filter:75 family=2 entries=10 op=nft_register_rule pid=2880 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:55.305000 audit[2880]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc84f7edc0 a2=0 a3=7ffc84f7edac items=0 ppid=1729 pid=2880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.305000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:55.314000 audit[2880]: NETFILTER_CFG table=nat:76 family=2 entries=44 op=nft_register_rule pid=2880 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:55.314000 audit[2880]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffc84f7edc0 a2=0 a3=7ffc84f7edac items=0 ppid=1729 pid=2880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.314000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:56.052525 kubelet[1451]: E0515 10:39:56.052494 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:56.306000 audit[2890]: NETFILTER_CFG table=filter:77 family=2 entries=10 op=nft_register_rule pid=2890 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:56.306000 audit[2890]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffe42a80950 a2=0 a3=7ffe42a8093c items=0 ppid=1729 pid=2890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:56.306000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:56.315000 audit[2890]: NETFILTER_CFG table=nat:78 family=2 entries=56 op=nft_register_chain pid=2890 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:56.315000 audit[2890]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffe42a80950 a2=0 a3=7ffe42a8093c items=0 ppid=1729 pid=2890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:56.315000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:57.053111 kubelet[1451]: E0515 10:39:57.053066 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:57.990057 env[1202]: time="2025-05-15T10:39:57.990004006Z" level=info msg="StopPodSandbox for \"f41ebfc0e7094a909f14919e7d2061fc60045b4cde979d1b2271d835b6a0f376\"" May 15 10:39:58.034882 kubelet[1451]: I0515 10:39:58.034740 1451 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-qnkmn" podStartSLOduration=11.034723306 podStartE2EDuration="11.034723306s" podCreationTimestamp="2025-05-15 10:39:47 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:39:50.303088699 +0000 UTC m=+60.366322233" watchObservedRunningTime="2025-05-15 10:39:58.034723306 +0000 UTC m=+68.097956790" May 15 10:39:58.053701 kubelet[1451]: E0515 10:39:58.053652 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:58.072547 env[1202]: 2025-05-15 10:39:58.034 [INFO][2909] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f41ebfc0e7094a909f14919e7d2061fc60045b4cde979d1b2271d835b6a0f376" May 15 10:39:58.072547 env[1202]: 2025-05-15 10:39:58.034 [INFO][2909] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="f41ebfc0e7094a909f14919e7d2061fc60045b4cde979d1b2271d835b6a0f376" iface="eth0" netns="/var/run/netns/cni-d1a73feb-0bd1-cbbb-62c1-9fc0d56c10bc" May 15 10:39:58.072547 env[1202]: 2025-05-15 10:39:58.035 [INFO][2909] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="f41ebfc0e7094a909f14919e7d2061fc60045b4cde979d1b2271d835b6a0f376" iface="eth0" netns="/var/run/netns/cni-d1a73feb-0bd1-cbbb-62c1-9fc0d56c10bc" May 15 10:39:58.072547 env[1202]: 2025-05-15 10:39:58.035 [INFO][2909] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="f41ebfc0e7094a909f14919e7d2061fc60045b4cde979d1b2271d835b6a0f376" iface="eth0" netns="/var/run/netns/cni-d1a73feb-0bd1-cbbb-62c1-9fc0d56c10bc" May 15 10:39:58.072547 env[1202]: 2025-05-15 10:39:58.035 [INFO][2909] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f41ebfc0e7094a909f14919e7d2061fc60045b4cde979d1b2271d835b6a0f376" May 15 10:39:58.072547 env[1202]: 2025-05-15 10:39:58.035 [INFO][2909] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f41ebfc0e7094a909f14919e7d2061fc60045b4cde979d1b2271d835b6a0f376" May 15 10:39:58.072547 env[1202]: 2025-05-15 10:39:58.058 [INFO][2918] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f41ebfc0e7094a909f14919e7d2061fc60045b4cde979d1b2271d835b6a0f376" HandleID="k8s-pod-network.f41ebfc0e7094a909f14919e7d2061fc60045b4cde979d1b2271d835b6a0f376" Workload="10.0.0.55-k8s-csi--node--driver--hwpkv-eth0" May 15 10:39:58.072547 env[1202]: 2025-05-15 10:39:58.058 [INFO][2918] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:39:58.072547 env[1202]: 2025-05-15 10:39:58.058 [INFO][2918] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:39:58.072547 env[1202]: 2025-05-15 10:39:58.068 [WARNING][2918] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f41ebfc0e7094a909f14919e7d2061fc60045b4cde979d1b2271d835b6a0f376" HandleID="k8s-pod-network.f41ebfc0e7094a909f14919e7d2061fc60045b4cde979d1b2271d835b6a0f376" Workload="10.0.0.55-k8s-csi--node--driver--hwpkv-eth0" May 15 10:39:58.072547 env[1202]: 2025-05-15 10:39:58.068 [INFO][2918] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f41ebfc0e7094a909f14919e7d2061fc60045b4cde979d1b2271d835b6a0f376" HandleID="k8s-pod-network.f41ebfc0e7094a909f14919e7d2061fc60045b4cde979d1b2271d835b6a0f376" Workload="10.0.0.55-k8s-csi--node--driver--hwpkv-eth0" May 15 10:39:58.072547 env[1202]: 2025-05-15 10:39:58.069 [INFO][2918] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:39:58.072547 env[1202]: 2025-05-15 10:39:58.071 [INFO][2909] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f41ebfc0e7094a909f14919e7d2061fc60045b4cde979d1b2271d835b6a0f376" May 15 10:39:58.073184 env[1202]: time="2025-05-15T10:39:58.072695098Z" level=info msg="TearDown network for sandbox \"f41ebfc0e7094a909f14919e7d2061fc60045b4cde979d1b2271d835b6a0f376\" successfully" May 15 10:39:58.073184 env[1202]: time="2025-05-15T10:39:58.072727569Z" level=info msg="StopPodSandbox for \"f41ebfc0e7094a909f14919e7d2061fc60045b4cde979d1b2271d835b6a0f376\" returns successfully" May 15 10:39:58.073522 env[1202]: time="2025-05-15T10:39:58.073491741Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-hwpkv,Uid:cca26a38-64ea-47f2-8e19-11a1392a4fe2,Namespace:calico-system,Attempt:1,}" May 15 10:39:58.074456 systemd[1]: run-netns-cni\x2dd1a73feb\x2d0bd1\x2dcbbb\x2d62c1\x2d9fc0d56c10bc.mount: Deactivated successfully. May 15 10:39:58.180834 systemd-networkd[1020]: cali9fd8186ec5b: Link UP May 15 10:39:58.183397 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 10:39:58.183449 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali9fd8186ec5b: link becomes ready May 15 10:39:58.183289 systemd-networkd[1020]: cali9fd8186ec5b: Gained carrier May 15 10:39:58.192875 env[1202]: 2025-05-15 10:39:58.118 [INFO][2927] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.55-k8s-csi--node--driver--hwpkv-eth0 csi-node-driver- calico-system cca26a38-64ea-47f2-8e19-11a1392a4fe2 1152 0 2025-05-15 10:38:51 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b7b4b9d k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.0.0.55 csi-node-driver-hwpkv eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali9fd8186ec5b [] []}} ContainerID="f50d8bf15a0e7e281b24fb2e4368bbf45173f3b7a103617655f41faa9340f507" Namespace="calico-system" Pod="csi-node-driver-hwpkv" WorkloadEndpoint="10.0.0.55-k8s-csi--node--driver--hwpkv-" May 15 10:39:58.192875 env[1202]: 2025-05-15 10:39:58.118 [INFO][2927] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="f50d8bf15a0e7e281b24fb2e4368bbf45173f3b7a103617655f41faa9340f507" Namespace="calico-system" Pod="csi-node-driver-hwpkv" WorkloadEndpoint="10.0.0.55-k8s-csi--node--driver--hwpkv-eth0" May 15 10:39:58.192875 env[1202]: 2025-05-15 10:39:58.145 [INFO][2941] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f50d8bf15a0e7e281b24fb2e4368bbf45173f3b7a103617655f41faa9340f507" HandleID="k8s-pod-network.f50d8bf15a0e7e281b24fb2e4368bbf45173f3b7a103617655f41faa9340f507" Workload="10.0.0.55-k8s-csi--node--driver--hwpkv-eth0" May 15 10:39:58.192875 env[1202]: 2025-05-15 10:39:58.154 [INFO][2941] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f50d8bf15a0e7e281b24fb2e4368bbf45173f3b7a103617655f41faa9340f507" HandleID="k8s-pod-network.f50d8bf15a0e7e281b24fb2e4368bbf45173f3b7a103617655f41faa9340f507" Workload="10.0.0.55-k8s-csi--node--driver--hwpkv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ec0e0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.55", "pod":"csi-node-driver-hwpkv", "timestamp":"2025-05-15 10:39:58.145132886 +0000 UTC"}, Hostname:"10.0.0.55", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:39:58.192875 env[1202]: 2025-05-15 10:39:58.154 [INFO][2941] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:39:58.192875 env[1202]: 2025-05-15 10:39:58.154 [INFO][2941] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:39:58.192875 env[1202]: 2025-05-15 10:39:58.154 [INFO][2941] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.55' May 15 10:39:58.192875 env[1202]: 2025-05-15 10:39:58.155 [INFO][2941] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f50d8bf15a0e7e281b24fb2e4368bbf45173f3b7a103617655f41faa9340f507" host="10.0.0.55" May 15 10:39:58.192875 env[1202]: 2025-05-15 10:39:58.158 [INFO][2941] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.55" May 15 10:39:58.192875 env[1202]: 2025-05-15 10:39:58.162 [INFO][2941] ipam/ipam.go 489: Trying affinity for 192.168.23.192/26 host="10.0.0.55" May 15 10:39:58.192875 env[1202]: 2025-05-15 10:39:58.163 [INFO][2941] ipam/ipam.go 155: Attempting to load block cidr=192.168.23.192/26 host="10.0.0.55" May 15 10:39:58.192875 env[1202]: 2025-05-15 10:39:58.165 [INFO][2941] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.23.192/26 host="10.0.0.55" May 15 10:39:58.192875 env[1202]: 2025-05-15 10:39:58.165 [INFO][2941] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.23.192/26 handle="k8s-pod-network.f50d8bf15a0e7e281b24fb2e4368bbf45173f3b7a103617655f41faa9340f507" host="10.0.0.55" May 15 10:39:58.192875 env[1202]: 2025-05-15 10:39:58.166 [INFO][2941] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.f50d8bf15a0e7e281b24fb2e4368bbf45173f3b7a103617655f41faa9340f507 May 15 10:39:58.192875 env[1202]: 2025-05-15 10:39:58.171 [INFO][2941] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.23.192/26 handle="k8s-pod-network.f50d8bf15a0e7e281b24fb2e4368bbf45173f3b7a103617655f41faa9340f507" host="10.0.0.55" May 15 10:39:58.192875 env[1202]: 2025-05-15 10:39:58.176 [INFO][2941] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.23.193/26] block=192.168.23.192/26 handle="k8s-pod-network.f50d8bf15a0e7e281b24fb2e4368bbf45173f3b7a103617655f41faa9340f507" host="10.0.0.55" May 15 10:39:58.192875 env[1202]: 2025-05-15 10:39:58.176 [INFO][2941] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.23.193/26] handle="k8s-pod-network.f50d8bf15a0e7e281b24fb2e4368bbf45173f3b7a103617655f41faa9340f507" host="10.0.0.55" May 15 10:39:58.192875 env[1202]: 2025-05-15 10:39:58.176 [INFO][2941] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:39:58.192875 env[1202]: 2025-05-15 10:39:58.176 [INFO][2941] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.23.193/26] IPv6=[] ContainerID="f50d8bf15a0e7e281b24fb2e4368bbf45173f3b7a103617655f41faa9340f507" HandleID="k8s-pod-network.f50d8bf15a0e7e281b24fb2e4368bbf45173f3b7a103617655f41faa9340f507" Workload="10.0.0.55-k8s-csi--node--driver--hwpkv-eth0" May 15 10:39:58.193772 env[1202]: 2025-05-15 10:39:58.179 [INFO][2927] cni-plugin/k8s.go 386: Populated endpoint ContainerID="f50d8bf15a0e7e281b24fb2e4368bbf45173f3b7a103617655f41faa9340f507" Namespace="calico-system" Pod="csi-node-driver-hwpkv" WorkloadEndpoint="10.0.0.55-k8s-csi--node--driver--hwpkv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.55-k8s-csi--node--driver--hwpkv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"cca26a38-64ea-47f2-8e19-11a1392a4fe2", ResourceVersion:"1152", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 38, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.55", ContainerID:"", Pod:"csi-node-driver-hwpkv", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.23.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali9fd8186ec5b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:39:58.193772 env[1202]: 2025-05-15 10:39:58.179 [INFO][2927] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.23.193/32] ContainerID="f50d8bf15a0e7e281b24fb2e4368bbf45173f3b7a103617655f41faa9340f507" Namespace="calico-system" Pod="csi-node-driver-hwpkv" WorkloadEndpoint="10.0.0.55-k8s-csi--node--driver--hwpkv-eth0" May 15 10:39:58.193772 env[1202]: 2025-05-15 10:39:58.179 [INFO][2927] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali9fd8186ec5b ContainerID="f50d8bf15a0e7e281b24fb2e4368bbf45173f3b7a103617655f41faa9340f507" Namespace="calico-system" Pod="csi-node-driver-hwpkv" WorkloadEndpoint="10.0.0.55-k8s-csi--node--driver--hwpkv-eth0" May 15 10:39:58.193772 env[1202]: 2025-05-15 10:39:58.183 [INFO][2927] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f50d8bf15a0e7e281b24fb2e4368bbf45173f3b7a103617655f41faa9340f507" Namespace="calico-system" Pod="csi-node-driver-hwpkv" WorkloadEndpoint="10.0.0.55-k8s-csi--node--driver--hwpkv-eth0" May 15 10:39:58.193772 env[1202]: 2025-05-15 10:39:58.184 [INFO][2927] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="f50d8bf15a0e7e281b24fb2e4368bbf45173f3b7a103617655f41faa9340f507" Namespace="calico-system" Pod="csi-node-driver-hwpkv" WorkloadEndpoint="10.0.0.55-k8s-csi--node--driver--hwpkv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.55-k8s-csi--node--driver--hwpkv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"cca26a38-64ea-47f2-8e19-11a1392a4fe2", ResourceVersion:"1152", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 38, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.55", ContainerID:"f50d8bf15a0e7e281b24fb2e4368bbf45173f3b7a103617655f41faa9340f507", Pod:"csi-node-driver-hwpkv", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.23.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali9fd8186ec5b", MAC:"c2:4d:46:c4:fb:61", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:39:58.193772 env[1202]: 2025-05-15 10:39:58.190 [INFO][2927] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="f50d8bf15a0e7e281b24fb2e4368bbf45173f3b7a103617655f41faa9340f507" Namespace="calico-system" Pod="csi-node-driver-hwpkv" WorkloadEndpoint="10.0.0.55-k8s-csi--node--driver--hwpkv-eth0" May 15 10:39:58.200000 audit[2966]: NETFILTER_CFG table=filter:79 family=2 entries=34 op=nft_register_chain pid=2966 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:39:58.200000 audit[2966]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffebaa2e020 a2=0 a3=7ffebaa2e00c items=0 ppid=2660 pid=2966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:58.200000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:39:58.203343 env[1202]: time="2025-05-15T10:39:58.203265155Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:39:58.203343 env[1202]: time="2025-05-15T10:39:58.203298778Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:39:58.203343 env[1202]: time="2025-05-15T10:39:58.203308757Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:39:58.203480 env[1202]: time="2025-05-15T10:39:58.203422791Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f50d8bf15a0e7e281b24fb2e4368bbf45173f3b7a103617655f41faa9340f507 pid=2970 runtime=io.containerd.runc.v2 May 15 10:39:58.215608 systemd[1]: Started cri-containerd-f50d8bf15a0e7e281b24fb2e4368bbf45173f3b7a103617655f41faa9340f507.scope. May 15 10:39:58.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.222000 audit: BPF prog-id=116 op=LOAD May 15 10:39:58.223000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.223000 audit[2982]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2970 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:58.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635306438626631356130653765323831623234666232653433363862 May 15 10:39:58.223000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.223000 audit[2982]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=2970 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:58.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635306438626631356130653765323831623234666232653433363862 May 15 10:39:58.223000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.223000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.223000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.223000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.223000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.223000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.223000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.223000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.223000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.223000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.223000 audit: BPF prog-id=117 op=LOAD May 15 10:39:58.223000 audit[2982]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0002c3410 items=0 ppid=2970 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:58.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635306438626631356130653765323831623234666232653433363862 May 15 10:39:58.223000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.223000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.223000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.223000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.223000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.223000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.223000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.223000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.223000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.223000 audit: BPF prog-id=118 op=LOAD May 15 10:39:58.223000 audit[2982]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0002c3458 items=0 ppid=2970 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:58.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635306438626631356130653765323831623234666232653433363862 May 15 10:39:58.223000 audit: BPF prog-id=118 op=UNLOAD May 15 10:39:58.223000 audit: BPF prog-id=117 op=UNLOAD May 15 10:39:58.223000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.223000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.223000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.223000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.223000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.223000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.223000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.223000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.223000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.223000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.223000 audit: BPF prog-id=119 op=LOAD May 15 10:39:58.223000 audit[2982]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0002c3868 items=0 ppid=2970 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:58.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635306438626631356130653765323831623234666232653433363862 May 15 10:39:58.225320 systemd-resolved[1140]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:39:58.233095 env[1202]: time="2025-05-15T10:39:58.233048785Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-hwpkv,Uid:cca26a38-64ea-47f2-8e19-11a1392a4fe2,Namespace:calico-system,Attempt:1,} returns sandbox id \"f50d8bf15a0e7e281b24fb2e4368bbf45173f3b7a103617655f41faa9340f507\"" May 15 10:39:58.234543 env[1202]: time="2025-05-15T10:39:58.234515294Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 15 10:39:59.054760 kubelet[1451]: E0515 10:39:59.054718 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:39:59.949760 systemd-networkd[1020]: cali9fd8186ec5b: Gained IPv6LL May 15 10:40:00.055426 kubelet[1451]: E0515 10:40:00.055393 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:40:00.162861 env[1202]: time="2025-05-15T10:40:00.162792925Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:00.164763 env[1202]: time="2025-05-15T10:40:00.164724316Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:00.166059 env[1202]: time="2025-05-15T10:40:00.166002613Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:00.167588 env[1202]: time="2025-05-15T10:40:00.167565002Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:00.168235 env[1202]: time="2025-05-15T10:40:00.168210702Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505\"" May 15 10:40:00.170275 env[1202]: time="2025-05-15T10:40:00.170227404Z" level=info msg="CreateContainer within sandbox \"f50d8bf15a0e7e281b24fb2e4368bbf45173f3b7a103617655f41faa9340f507\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 15 10:40:00.183246 env[1202]: time="2025-05-15T10:40:00.183198744Z" level=info msg="CreateContainer within sandbox \"f50d8bf15a0e7e281b24fb2e4368bbf45173f3b7a103617655f41faa9340f507\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"1195f9bed1051dc8f41992aebf30b3c7366b70f8ec3d2985921da5c52494b40d\"" May 15 10:40:00.183675 env[1202]: time="2025-05-15T10:40:00.183637846Z" level=info msg="StartContainer for \"1195f9bed1051dc8f41992aebf30b3c7366b70f8ec3d2985921da5c52494b40d\"" May 15 10:40:00.201653 systemd[1]: Started cri-containerd-1195f9bed1051dc8f41992aebf30b3c7366b70f8ec3d2985921da5c52494b40d.scope. May 15 10:40:00.210000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.212381 kernel: kauditd_printk_skb: 74 callbacks suppressed May 15 10:40:00.212433 kernel: audit: type=1400 audit(1747305600.210:701): avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.210000 audit[3012]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7ffaf42b4368 items=0 ppid=2970 pid=3012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:00.219749 kernel: audit: type=1300 audit(1747305600.210:701): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7ffaf42b4368 items=0 ppid=2970 pid=3012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:00.219793 kernel: audit: type=1327 audit(1747305600.210:701): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131393566396265643130353164633866343139393261656266333062 May 15 10:40:00.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131393566396265643130353164633866343139393261656266333062 May 15 10:40:00.210000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.226641 kernel: audit: type=1400 audit(1747305600.210:702): avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.226684 kernel: audit: type=1400 audit(1747305600.210:702): avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.210000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.210000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.232341 kernel: audit: type=1400 audit(1747305600.210:702): avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.232396 kernel: audit: type=1400 audit(1747305600.210:702): avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.210000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.210000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.236358 env[1202]: time="2025-05-15T10:40:00.236319157Z" level=info msg="StartContainer for \"1195f9bed1051dc8f41992aebf30b3c7366b70f8ec3d2985921da5c52494b40d\" returns successfully" May 15 10:40:00.237448 env[1202]: time="2025-05-15T10:40:00.237428638Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 15 10:40:00.238851 kernel: audit: type=1400 audit(1747305600.210:702): avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.238915 kernel: audit: type=1400 audit(1747305600.210:702): avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.210000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.210000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.245028 kernel: audit: type=1400 audit(1747305600.210:702): avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.210000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.210000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.210000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.210000 audit: BPF prog-id=120 op=LOAD May 15 10:40:00.210000 audit[3012]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000261eb8 items=0 ppid=2970 pid=3012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:00.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131393566396265643130353164633866343139393261656266333062 May 15 10:40:00.214000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.214000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.214000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.214000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.214000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.214000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.214000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.214000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.214000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.214000 audit: BPF prog-id=121 op=LOAD May 15 10:40:00.214000 audit[3012]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000261f08 items=0 ppid=2970 pid=3012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:00.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131393566396265643130353164633866343139393261656266333062 May 15 10:40:00.218000 audit: BPF prog-id=121 op=UNLOAD May 15 10:40:00.218000 audit: BPF prog-id=120 op=UNLOAD May 15 10:40:00.218000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.218000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.218000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.218000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.218000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.218000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.218000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.218000 audit[3012]: AVC avc: denied { perfmon } for pid=3012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.218000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.218000 audit[3012]: AVC avc: denied { bpf } for pid=3012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.218000 audit: BPF prog-id=122 op=LOAD May 15 10:40:00.218000 audit[3012]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000261f98 items=0 ppid=2970 pid=3012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:00.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131393566396265643130353164633866343139393261656266333062 May 15 10:40:00.989674 env[1202]: time="2025-05-15T10:40:00.989633347Z" level=info msg="StopPodSandbox for \"377d7488f356e412836b1b7717686869d4d9c16c8f7ab3e8d491ce04516cb8fb\"" May 15 10:40:01.055835 kubelet[1451]: E0515 10:40:01.055743 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:40:01.125158 env[1202]: 2025-05-15 10:40:01.093 [INFO][3054] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="377d7488f356e412836b1b7717686869d4d9c16c8f7ab3e8d491ce04516cb8fb" May 15 10:40:01.125158 env[1202]: 2025-05-15 10:40:01.093 [INFO][3054] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="377d7488f356e412836b1b7717686869d4d9c16c8f7ab3e8d491ce04516cb8fb" iface="eth0" netns="/var/run/netns/cni-f1123466-b445-3650-c9fe-f988d6e1d281" May 15 10:40:01.125158 env[1202]: 2025-05-15 10:40:01.094 [INFO][3054] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="377d7488f356e412836b1b7717686869d4d9c16c8f7ab3e8d491ce04516cb8fb" iface="eth0" netns="/var/run/netns/cni-f1123466-b445-3650-c9fe-f988d6e1d281" May 15 10:40:01.125158 env[1202]: 2025-05-15 10:40:01.094 [INFO][3054] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="377d7488f356e412836b1b7717686869d4d9c16c8f7ab3e8d491ce04516cb8fb" iface="eth0" netns="/var/run/netns/cni-f1123466-b445-3650-c9fe-f988d6e1d281" May 15 10:40:01.125158 env[1202]: 2025-05-15 10:40:01.094 [INFO][3054] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="377d7488f356e412836b1b7717686869d4d9c16c8f7ab3e8d491ce04516cb8fb" May 15 10:40:01.125158 env[1202]: 2025-05-15 10:40:01.094 [INFO][3054] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="377d7488f356e412836b1b7717686869d4d9c16c8f7ab3e8d491ce04516cb8fb" May 15 10:40:01.125158 env[1202]: 2025-05-15 10:40:01.114 [INFO][3064] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="377d7488f356e412836b1b7717686869d4d9c16c8f7ab3e8d491ce04516cb8fb" HandleID="k8s-pod-network.377d7488f356e412836b1b7717686869d4d9c16c8f7ab3e8d491ce04516cb8fb" Workload="10.0.0.55-k8s-nginx--deployment--85f456d6dd--98d2z-eth0" May 15 10:40:01.125158 env[1202]: 2025-05-15 10:40:01.114 [INFO][3064] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:40:01.125158 env[1202]: 2025-05-15 10:40:01.114 [INFO][3064] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:40:01.125158 env[1202]: 2025-05-15 10:40:01.118 [WARNING][3064] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="377d7488f356e412836b1b7717686869d4d9c16c8f7ab3e8d491ce04516cb8fb" HandleID="k8s-pod-network.377d7488f356e412836b1b7717686869d4d9c16c8f7ab3e8d491ce04516cb8fb" Workload="10.0.0.55-k8s-nginx--deployment--85f456d6dd--98d2z-eth0" May 15 10:40:01.125158 env[1202]: 2025-05-15 10:40:01.118 [INFO][3064] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="377d7488f356e412836b1b7717686869d4d9c16c8f7ab3e8d491ce04516cb8fb" HandleID="k8s-pod-network.377d7488f356e412836b1b7717686869d4d9c16c8f7ab3e8d491ce04516cb8fb" Workload="10.0.0.55-k8s-nginx--deployment--85f456d6dd--98d2z-eth0" May 15 10:40:01.125158 env[1202]: 2025-05-15 10:40:01.122 [INFO][3064] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:40:01.125158 env[1202]: 2025-05-15 10:40:01.123 [INFO][3054] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="377d7488f356e412836b1b7717686869d4d9c16c8f7ab3e8d491ce04516cb8fb" May 15 10:40:01.125624 env[1202]: time="2025-05-15T10:40:01.125360661Z" level=info msg="TearDown network for sandbox \"377d7488f356e412836b1b7717686869d4d9c16c8f7ab3e8d491ce04516cb8fb\" successfully" May 15 10:40:01.125624 env[1202]: time="2025-05-15T10:40:01.125394224Z" level=info msg="StopPodSandbox for \"377d7488f356e412836b1b7717686869d4d9c16c8f7ab3e8d491ce04516cb8fb\" returns successfully" May 15 10:40:01.126039 env[1202]: time="2025-05-15T10:40:01.126012773Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-98d2z,Uid:b2b75d8a-cdf9-4868-bdb4-a0cea7e9c4f0,Namespace:default,Attempt:1,}" May 15 10:40:01.180810 systemd[1]: run-netns-cni\x2df1123466\x2db445\x2d3650\x2dc9fe\x2df988d6e1d281.mount: Deactivated successfully. May 15 10:40:01.224980 systemd-networkd[1020]: cali9fc39f34b8a: Link UP May 15 10:40:01.227077 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 10:40:01.227129 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali9fc39f34b8a: link becomes ready May 15 10:40:01.227346 systemd-networkd[1020]: cali9fc39f34b8a: Gained carrier May 15 10:40:01.236709 env[1202]: 2025-05-15 10:40:01.167 [INFO][3076] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.55-k8s-nginx--deployment--85f456d6dd--98d2z-eth0 nginx-deployment-85f456d6dd- default b2b75d8a-cdf9-4868-bdb4-a0cea7e9c4f0 1185 0 2025-05-15 10:39:15 +0000 UTC map[app:nginx pod-template-hash:85f456d6dd projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.55 nginx-deployment-85f456d6dd-98d2z eth0 default [] [] [kns.default ksa.default.default] cali9fc39f34b8a [] []}} ContainerID="48896129e126b7659547fd8a95140640209129dd4ed186969512d047bbad3485" Namespace="default" Pod="nginx-deployment-85f456d6dd-98d2z" WorkloadEndpoint="10.0.0.55-k8s-nginx--deployment--85f456d6dd--98d2z-" May 15 10:40:01.236709 env[1202]: 2025-05-15 10:40:01.167 [INFO][3076] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="48896129e126b7659547fd8a95140640209129dd4ed186969512d047bbad3485" Namespace="default" Pod="nginx-deployment-85f456d6dd-98d2z" WorkloadEndpoint="10.0.0.55-k8s-nginx--deployment--85f456d6dd--98d2z-eth0" May 15 10:40:01.236709 env[1202]: 2025-05-15 10:40:01.190 [INFO][3089] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="48896129e126b7659547fd8a95140640209129dd4ed186969512d047bbad3485" HandleID="k8s-pod-network.48896129e126b7659547fd8a95140640209129dd4ed186969512d047bbad3485" Workload="10.0.0.55-k8s-nginx--deployment--85f456d6dd--98d2z-eth0" May 15 10:40:01.236709 env[1202]: 2025-05-15 10:40:01.198 [INFO][3089] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="48896129e126b7659547fd8a95140640209129dd4ed186969512d047bbad3485" HandleID="k8s-pod-network.48896129e126b7659547fd8a95140640209129dd4ed186969512d047bbad3485" Workload="10.0.0.55-k8s-nginx--deployment--85f456d6dd--98d2z-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003b4090), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.55", "pod":"nginx-deployment-85f456d6dd-98d2z", "timestamp":"2025-05-15 10:40:01.190746852 +0000 UTC"}, Hostname:"10.0.0.55", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:40:01.236709 env[1202]: 2025-05-15 10:40:01.198 [INFO][3089] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:40:01.236709 env[1202]: 2025-05-15 10:40:01.198 [INFO][3089] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:40:01.236709 env[1202]: 2025-05-15 10:40:01.198 [INFO][3089] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.55' May 15 10:40:01.236709 env[1202]: 2025-05-15 10:40:01.199 [INFO][3089] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.48896129e126b7659547fd8a95140640209129dd4ed186969512d047bbad3485" host="10.0.0.55" May 15 10:40:01.236709 env[1202]: 2025-05-15 10:40:01.202 [INFO][3089] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.55" May 15 10:40:01.236709 env[1202]: 2025-05-15 10:40:01.207 [INFO][3089] ipam/ipam.go 489: Trying affinity for 192.168.23.192/26 host="10.0.0.55" May 15 10:40:01.236709 env[1202]: 2025-05-15 10:40:01.209 [INFO][3089] ipam/ipam.go 155: Attempting to load block cidr=192.168.23.192/26 host="10.0.0.55" May 15 10:40:01.236709 env[1202]: 2025-05-15 10:40:01.210 [INFO][3089] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.23.192/26 host="10.0.0.55" May 15 10:40:01.236709 env[1202]: 2025-05-15 10:40:01.210 [INFO][3089] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.23.192/26 handle="k8s-pod-network.48896129e126b7659547fd8a95140640209129dd4ed186969512d047bbad3485" host="10.0.0.55" May 15 10:40:01.236709 env[1202]: 2025-05-15 10:40:01.211 [INFO][3089] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.48896129e126b7659547fd8a95140640209129dd4ed186969512d047bbad3485 May 15 10:40:01.236709 env[1202]: 2025-05-15 10:40:01.215 [INFO][3089] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.23.192/26 handle="k8s-pod-network.48896129e126b7659547fd8a95140640209129dd4ed186969512d047bbad3485" host="10.0.0.55" May 15 10:40:01.236709 env[1202]: 2025-05-15 10:40:01.221 [INFO][3089] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.23.194/26] block=192.168.23.192/26 handle="k8s-pod-network.48896129e126b7659547fd8a95140640209129dd4ed186969512d047bbad3485" host="10.0.0.55" May 15 10:40:01.236709 env[1202]: 2025-05-15 10:40:01.221 [INFO][3089] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.23.194/26] handle="k8s-pod-network.48896129e126b7659547fd8a95140640209129dd4ed186969512d047bbad3485" host="10.0.0.55" May 15 10:40:01.236709 env[1202]: 2025-05-15 10:40:01.221 [INFO][3089] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:40:01.236709 env[1202]: 2025-05-15 10:40:01.222 [INFO][3089] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.23.194/26] IPv6=[] ContainerID="48896129e126b7659547fd8a95140640209129dd4ed186969512d047bbad3485" HandleID="k8s-pod-network.48896129e126b7659547fd8a95140640209129dd4ed186969512d047bbad3485" Workload="10.0.0.55-k8s-nginx--deployment--85f456d6dd--98d2z-eth0" May 15 10:40:01.237428 env[1202]: 2025-05-15 10:40:01.223 [INFO][3076] cni-plugin/k8s.go 386: Populated endpoint ContainerID="48896129e126b7659547fd8a95140640209129dd4ed186969512d047bbad3485" Namespace="default" Pod="nginx-deployment-85f456d6dd-98d2z" WorkloadEndpoint="10.0.0.55-k8s-nginx--deployment--85f456d6dd--98d2z-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.55-k8s-nginx--deployment--85f456d6dd--98d2z-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"b2b75d8a-cdf9-4868-bdb4-a0cea7e9c4f0", ResourceVersion:"1185", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 39, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.55", ContainerID:"", Pod:"nginx-deployment-85f456d6dd-98d2z", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.23.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali9fc39f34b8a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:40:01.237428 env[1202]: 2025-05-15 10:40:01.223 [INFO][3076] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.23.194/32] ContainerID="48896129e126b7659547fd8a95140640209129dd4ed186969512d047bbad3485" Namespace="default" Pod="nginx-deployment-85f456d6dd-98d2z" WorkloadEndpoint="10.0.0.55-k8s-nginx--deployment--85f456d6dd--98d2z-eth0" May 15 10:40:01.237428 env[1202]: 2025-05-15 10:40:01.223 [INFO][3076] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali9fc39f34b8a ContainerID="48896129e126b7659547fd8a95140640209129dd4ed186969512d047bbad3485" Namespace="default" Pod="nginx-deployment-85f456d6dd-98d2z" WorkloadEndpoint="10.0.0.55-k8s-nginx--deployment--85f456d6dd--98d2z-eth0" May 15 10:40:01.237428 env[1202]: 2025-05-15 10:40:01.227 [INFO][3076] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="48896129e126b7659547fd8a95140640209129dd4ed186969512d047bbad3485" Namespace="default" Pod="nginx-deployment-85f456d6dd-98d2z" WorkloadEndpoint="10.0.0.55-k8s-nginx--deployment--85f456d6dd--98d2z-eth0" May 15 10:40:01.237428 env[1202]: 2025-05-15 10:40:01.229 [INFO][3076] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="48896129e126b7659547fd8a95140640209129dd4ed186969512d047bbad3485" Namespace="default" Pod="nginx-deployment-85f456d6dd-98d2z" WorkloadEndpoint="10.0.0.55-k8s-nginx--deployment--85f456d6dd--98d2z-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.55-k8s-nginx--deployment--85f456d6dd--98d2z-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"b2b75d8a-cdf9-4868-bdb4-a0cea7e9c4f0", ResourceVersion:"1185", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 39, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.55", ContainerID:"48896129e126b7659547fd8a95140640209129dd4ed186969512d047bbad3485", Pod:"nginx-deployment-85f456d6dd-98d2z", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.23.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali9fc39f34b8a", MAC:"da:8e:b6:73:8b:c3", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:40:01.237428 env[1202]: 2025-05-15 10:40:01.235 [INFO][3076] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="48896129e126b7659547fd8a95140640209129dd4ed186969512d047bbad3485" Namespace="default" Pod="nginx-deployment-85f456d6dd-98d2z" WorkloadEndpoint="10.0.0.55-k8s-nginx--deployment--85f456d6dd--98d2z-eth0" May 15 10:40:01.244000 audit[3115]: NETFILTER_CFG table=filter:80 family=2 entries=38 op=nft_register_chain pid=3115 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:40:01.244000 audit[3115]: SYSCALL arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7ffc72fc6070 a2=0 a3=7ffc72fc605c items=0 ppid=2660 pid=3115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:01.244000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:40:01.247151 env[1202]: time="2025-05-15T10:40:01.247099868Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:40:01.247151 env[1202]: time="2025-05-15T10:40:01.247135695Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:40:01.247304 env[1202]: time="2025-05-15T10:40:01.247270678Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:40:01.247586 env[1202]: time="2025-05-15T10:40:01.247546425Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/48896129e126b7659547fd8a95140640209129dd4ed186969512d047bbad3485 pid=3120 runtime=io.containerd.runc.v2 May 15 10:40:01.260716 systemd[1]: run-containerd-runc-k8s.io-48896129e126b7659547fd8a95140640209129dd4ed186969512d047bbad3485-runc.QSGKUl.mount: Deactivated successfully. May 15 10:40:01.262871 systemd[1]: Started cri-containerd-48896129e126b7659547fd8a95140640209129dd4ed186969512d047bbad3485.scope. May 15 10:40:01.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.272000 audit: BPF prog-id=123 op=LOAD May 15 10:40:01.272000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.272000 audit[3131]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3120 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:01.272000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438383936313239653132366237363539353437666438613935313430 May 15 10:40:01.273000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.273000 audit[3131]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3120 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:01.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438383936313239653132366237363539353437666438613935313430 May 15 10:40:01.273000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.273000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.273000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.273000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.273000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.273000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.273000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.273000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.273000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.273000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.273000 audit: BPF prog-id=124 op=LOAD May 15 10:40:01.273000 audit[3131]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00028aed0 items=0 ppid=3120 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:01.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438383936313239653132366237363539353437666438613935313430 May 15 10:40:01.273000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.273000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.273000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.273000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.273000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.273000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.273000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.273000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.273000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.273000 audit: BPF prog-id=125 op=LOAD May 15 10:40:01.273000 audit[3131]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00028af18 items=0 ppid=3120 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:01.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438383936313239653132366237363539353437666438613935313430 May 15 10:40:01.273000 audit: BPF prog-id=125 op=UNLOAD May 15 10:40:01.273000 audit: BPF prog-id=124 op=UNLOAD May 15 10:40:01.273000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.273000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.273000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.273000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.273000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.273000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.273000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.273000 audit[3131]: AVC avc: denied { perfmon } for pid=3131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.273000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.273000 audit[3131]: AVC avc: denied { bpf } for pid=3131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.273000 audit: BPF prog-id=126 op=LOAD May 15 10:40:01.273000 audit[3131]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00028b328 items=0 ppid=3120 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:01.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438383936313239653132366237363539353437666438613935313430 May 15 10:40:01.274598 systemd-resolved[1140]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:40:01.294075 env[1202]: time="2025-05-15T10:40:01.294035347Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-98d2z,Uid:b2b75d8a-cdf9-4868-bdb4-a0cea7e9c4f0,Namespace:default,Attempt:1,} returns sandbox id \"48896129e126b7659547fd8a95140640209129dd4ed186969512d047bbad3485\"" May 15 10:40:02.056111 kubelet[1451]: E0515 10:40:02.056045 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:40:02.720136 env[1202]: time="2025-05-15T10:40:02.720083232Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:02.722358 env[1202]: time="2025-05-15T10:40:02.722308834Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:02.724029 env[1202]: time="2025-05-15T10:40:02.723995507Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:02.725424 env[1202]: time="2025-05-15T10:40:02.725396483Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:02.725906 env[1202]: time="2025-05-15T10:40:02.725882655Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9\"" May 15 10:40:02.726896 env[1202]: time="2025-05-15T10:40:02.726874284Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 15 10:40:02.727827 env[1202]: time="2025-05-15T10:40:02.727773771Z" level=info msg="CreateContainer within sandbox \"f50d8bf15a0e7e281b24fb2e4368bbf45173f3b7a103617655f41faa9340f507\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 15 10:40:02.742146 env[1202]: time="2025-05-15T10:40:02.742006716Z" level=info msg="CreateContainer within sandbox \"f50d8bf15a0e7e281b24fb2e4368bbf45173f3b7a103617655f41faa9340f507\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"3ce113069fa5086ad6c7364f3ce57c0926e06e3d2bb715006a8dc00d868262f6\"" May 15 10:40:02.742882 env[1202]: time="2025-05-15T10:40:02.742856168Z" level=info msg="StartContainer for \"3ce113069fa5086ad6c7364f3ce57c0926e06e3d2bb715006a8dc00d868262f6\"" May 15 10:40:02.760314 systemd[1]: Started cri-containerd-3ce113069fa5086ad6c7364f3ce57c0926e06e3d2bb715006a8dc00d868262f6.scope. May 15 10:40:02.765014 systemd-networkd[1020]: cali9fc39f34b8a: Gained IPv6LL May 15 10:40:02.774000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:02.774000 audit[3166]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fde01c165a8 items=0 ppid=2970 pid=3166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:02.774000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363653131333036396661353038366164366337333634663363653537 May 15 10:40:02.774000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:02.774000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:02.774000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:02.774000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:02.774000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:02.774000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:02.774000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:02.774000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:02.774000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:02.774000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:02.774000 audit: BPF prog-id=127 op=LOAD May 15 10:40:02.774000 audit[3166]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000273ba8 items=0 ppid=2970 pid=3166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:02.774000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363653131333036396661353038366164366337333634663363653537 May 15 10:40:02.774000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:02.774000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:02.774000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:02.774000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:02.774000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:02.774000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:02.774000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:02.774000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:02.774000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:02.774000 audit: BPF prog-id=128 op=LOAD May 15 10:40:02.774000 audit[3166]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000273bf8 items=0 ppid=2970 pid=3166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:02.774000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363653131333036396661353038366164366337333634663363653537 May 15 10:40:02.774000 audit: BPF prog-id=128 op=UNLOAD May 15 10:40:02.774000 audit: BPF prog-id=127 op=UNLOAD May 15 10:40:02.774000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:02.774000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:02.774000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:02.774000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:02.774000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:02.774000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:02.774000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:02.774000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:02.774000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:02.774000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:02.774000 audit: BPF prog-id=129 op=LOAD May 15 10:40:02.774000 audit[3166]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000273c88 items=0 ppid=2970 pid=3166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:02.774000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363653131333036396661353038366164366337333634663363653537 May 15 10:40:02.866491 env[1202]: time="2025-05-15T10:40:02.866421612Z" level=info msg="StartContainer for \"3ce113069fa5086ad6c7364f3ce57c0926e06e3d2bb715006a8dc00d868262f6\" returns successfully" May 15 10:40:03.056777 kubelet[1451]: E0515 10:40:03.056636 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:40:03.683268 kubelet[1451]: I0515 10:40:03.683239 1451 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 15 10:40:03.683268 kubelet[1451]: I0515 10:40:03.683266 1451 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 15 10:40:04.057462 kubelet[1451]: E0515 10:40:04.057340 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:40:05.058331 kubelet[1451]: E0515 10:40:05.058273 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:40:05.930307 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3975051265.mount: Deactivated successfully. May 15 10:40:06.058575 kubelet[1451]: E0515 10:40:06.058514 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:40:07.058878 kubelet[1451]: E0515 10:40:07.058825 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:40:08.059515 kubelet[1451]: E0515 10:40:08.059414 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:40:08.328893 env[1202]: time="2025-05-15T10:40:08.328766906Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:08.331396 env[1202]: time="2025-05-15T10:40:08.331362142Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:08.333613 env[1202]: time="2025-05-15T10:40:08.333585951Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:08.335633 env[1202]: time="2025-05-15T10:40:08.335609165Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:08.336319 env[1202]: time="2025-05-15T10:40:08.336291304Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa\"" May 15 10:40:08.338158 env[1202]: time="2025-05-15T10:40:08.338135883Z" level=info msg="CreateContainer within sandbox \"48896129e126b7659547fd8a95140640209129dd4ed186969512d047bbad3485\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" May 15 10:40:08.350669 env[1202]: time="2025-05-15T10:40:08.350628607Z" level=info msg="CreateContainer within sandbox \"48896129e126b7659547fd8a95140640209129dd4ed186969512d047bbad3485\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"bc21a1fa32e7047dbb6ef441fff439f319656851cee0f396f38c4e30a5c1520f\"" May 15 10:40:08.351001 env[1202]: time="2025-05-15T10:40:08.350965217Z" level=info msg="StartContainer for \"bc21a1fa32e7047dbb6ef441fff439f319656851cee0f396f38c4e30a5c1520f\"" May 15 10:40:08.368140 systemd[1]: Started cri-containerd-bc21a1fa32e7047dbb6ef441fff439f319656851cee0f396f38c4e30a5c1520f.scope. May 15 10:40:08.388978 kernel: kauditd_printk_skb: 136 callbacks suppressed May 15 10:40:08.389143 kernel: audit: type=1400 audit(1747305608.378:732): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.389165 kernel: audit: type=1400 audit(1747305608.378:733): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.389185 kernel: audit: type=1400 audit(1747305608.378:734): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.392423 kernel: audit: type=1400 audit(1747305608.378:735): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.395424 kernel: audit: type=1400 audit(1747305608.378:736): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.395467 kernel: audit: type=1400 audit(1747305608.378:737): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.401305 kernel: audit: type=1400 audit(1747305608.378:738): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.404483 kernel: audit: type=1400 audit(1747305608.378:739): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.407862 kernel: audit: type=1400 audit(1747305608.378:740): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.407935 kernel: audit: type=1400 audit(1747305608.382:741): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.382000 audit: BPF prog-id=130 op=LOAD May 15 10:40:08.382000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.382000 audit[3206]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3120 pid=3206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:08.382000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263323161316661333265373034376462623665663434316666663433 May 15 10:40:08.382000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.382000 audit[3206]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3120 pid=3206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:08.382000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263323161316661333265373034376462623665663434316666663433 May 15 10:40:08.382000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.382000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.382000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.382000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.382000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.382000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.382000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.382000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.382000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.382000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.382000 audit: BPF prog-id=131 op=LOAD May 15 10:40:08.382000 audit[3206]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003c62c0 items=0 ppid=3120 pid=3206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:08.382000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263323161316661333265373034376462623665663434316666663433 May 15 10:40:08.385000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.385000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.385000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.385000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.385000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.385000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.385000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.385000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.385000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.385000 audit: BPF prog-id=132 op=LOAD May 15 10:40:08.385000 audit[3206]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003c6308 items=0 ppid=3120 pid=3206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:08.385000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263323161316661333265373034376462623665663434316666663433 May 15 10:40:08.388000 audit: BPF prog-id=132 op=UNLOAD May 15 10:40:08.388000 audit: BPF prog-id=131 op=UNLOAD May 15 10:40:08.388000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.388000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.388000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.388000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.388000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.388000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.388000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.388000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.388000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.388000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.388000 audit: BPF prog-id=133 op=LOAD May 15 10:40:08.388000 audit[3206]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003c6718 items=0 ppid=3120 pid=3206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:08.388000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263323161316661333265373034376462623665663434316666663433 May 15 10:40:08.414804 env[1202]: time="2025-05-15T10:40:08.414775170Z" level=info msg="StartContainer for \"bc21a1fa32e7047dbb6ef441fff439f319656851cee0f396f38c4e30a5c1520f\" returns successfully" May 15 10:40:09.060452 kubelet[1451]: E0515 10:40:09.060382 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:40:09.330548 kubelet[1451]: I0515 10:40:09.330422 1451 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-hwpkv" podStartSLOduration=73.837919626 podStartE2EDuration="1m18.330404732s" podCreationTimestamp="2025-05-15 10:38:51 +0000 UTC" firstStartedPulling="2025-05-15 10:39:58.234089926 +0000 UTC m=+68.297323411" lastFinishedPulling="2025-05-15 10:40:02.726575023 +0000 UTC m=+72.789808517" observedRunningTime="2025-05-15 10:40:03.326221869 +0000 UTC m=+73.389455364" watchObservedRunningTime="2025-05-15 10:40:09.330404732 +0000 UTC m=+79.393638216" May 15 10:40:09.363000 audit[3256]: NETFILTER_CFG table=filter:81 family=2 entries=10 op=nft_register_rule pid=3256 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:09.363000 audit[3256]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff92fd2140 a2=0 a3=7fff92fd212c items=0 ppid=1729 pid=3256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:09.363000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:09.369000 audit[3256]: NETFILTER_CFG table=nat:82 family=2 entries=20 op=nft_register_rule pid=3256 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:09.369000 audit[3256]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff92fd2140 a2=0 a3=7fff92fd212c items=0 ppid=1729 pid=3256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:09.369000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:09.385000 audit[3258]: NETFILTER_CFG table=filter:83 family=2 entries=10 op=nft_register_rule pid=3258 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:09.385000 audit[3258]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fffbe9a2960 a2=0 a3=7fffbe9a294c items=0 ppid=1729 pid=3258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:09.385000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:09.394000 audit[3258]: NETFILTER_CFG table=nat:84 family=2 entries=20 op=nft_register_rule pid=3258 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:09.394000 audit[3258]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fffbe9a2960 a2=0 a3=7fffbe9a294c items=0 ppid=1729 pid=3258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:09.394000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:10.061397 kubelet[1451]: E0515 10:40:10.061333 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:40:10.408000 audit[3260]: NETFILTER_CFG table=filter:85 family=2 entries=9 op=nft_register_rule pid=3260 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:10.408000 audit[3260]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc8cf70c50 a2=0 a3=7ffc8cf70c3c items=0 ppid=1729 pid=3260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:10.408000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:10.413000 audit[3260]: NETFILTER_CFG table=nat:86 family=2 entries=31 op=nft_register_chain pid=3260 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:10.413000 audit[3260]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffc8cf70c50 a2=0 a3=7ffc8cf70c3c items=0 ppid=1729 pid=3260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:10.413000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:11.001790 kubelet[1451]: E0515 10:40:11.001732 1451 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:40:11.062183 kubelet[1451]: E0515 10:40:11.062113 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:40:12.062642 kubelet[1451]: E0515 10:40:12.062495 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:40:13.063061 kubelet[1451]: E0515 10:40:13.063022 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:40:14.063769 kubelet[1451]: E0515 10:40:14.063733 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:40:15.064168 kubelet[1451]: E0515 10:40:15.064107 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:40:15.782000 audit[3270]: NETFILTER_CFG table=filter:87 family=2 entries=20 op=nft_register_rule pid=3270 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:15.784284 kernel: kauditd_printk_skb: 65 callbacks suppressed May 15 10:40:15.784356 kernel: audit: type=1325 audit(1747305615.782:756): table=filter:87 family=2 entries=20 op=nft_register_rule pid=3270 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:15.782000 audit[3270]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffd1eba2ad0 a2=0 a3=7ffd1eba2abc items=0 ppid=1729 pid=3270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:15.793348 kernel: audit: type=1300 audit(1747305615.782:756): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffd1eba2ad0 a2=0 a3=7ffd1eba2abc items=0 ppid=1729 pid=3270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:15.793393 kernel: audit: type=1327 audit(1747305615.782:756): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:15.782000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:15.801000 audit[3270]: NETFILTER_CFG table=nat:88 family=2 entries=22 op=nft_register_rule pid=3270 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:15.801000 audit[3270]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd1eba2ad0 a2=0 a3=0 items=0 ppid=1729 pid=3270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:15.811646 kernel: audit: type=1325 audit(1747305615.801:757): table=nat:88 family=2 entries=22 op=nft_register_rule pid=3270 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:15.811809 kernel: audit: type=1300 audit(1747305615.801:757): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd1eba2ad0 a2=0 a3=0 items=0 ppid=1729 pid=3270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:15.811862 kernel: audit: type=1327 audit(1747305615.801:757): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:15.801000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:15.824000 audit[3272]: NETFILTER_CFG table=filter:89 family=2 entries=32 op=nft_register_rule pid=3272 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:15.824000 audit[3272]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffcd8b5f330 a2=0 a3=7ffcd8b5f31c items=0 ppid=1729 pid=3272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:15.833012 kernel: audit: type=1325 audit(1747305615.824:758): table=filter:89 family=2 entries=32 op=nft_register_rule pid=3272 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:15.833080 kernel: audit: type=1300 audit(1747305615.824:758): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffcd8b5f330 a2=0 a3=7ffcd8b5f31c items=0 ppid=1729 pid=3272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:15.833114 kernel: audit: type=1327 audit(1747305615.824:758): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:15.824000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:15.833575 kubelet[1451]: I0515 10:40:15.833522 1451 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-85f456d6dd-98d2z" podStartSLOduration=53.7917116 podStartE2EDuration="1m0.833507003s" podCreationTimestamp="2025-05-15 10:39:15 +0000 UTC" firstStartedPulling="2025-05-15 10:40:01.295365632 +0000 UTC m=+71.358599106" lastFinishedPulling="2025-05-15 10:40:08.337161025 +0000 UTC m=+78.400394509" observedRunningTime="2025-05-15 10:40:09.330467339 +0000 UTC m=+79.393700823" watchObservedRunningTime="2025-05-15 10:40:15.833507003 +0000 UTC m=+85.896740488" May 15 10:40:15.833752 kubelet[1451]: I0515 10:40:15.833630 1451 topology_manager.go:215] "Topology Admit Handler" podUID="b83aed7b-8fde-497b-a230-bf55f9919e58" podNamespace="default" podName="nfs-server-provisioner-0" May 15 10:40:15.835000 audit[3272]: NETFILTER_CFG table=nat:90 family=2 entries=22 op=nft_register_rule pid=3272 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:15.838334 systemd[1]: Created slice kubepods-besteffort-podb83aed7b_8fde_497b_a230_bf55f9919e58.slice. May 15 10:40:15.835000 audit[3272]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffcd8b5f330 a2=0 a3=0 items=0 ppid=1729 pid=3272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:15.835000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:15.839839 kernel: audit: type=1325 audit(1747305615.835:759): table=nat:90 family=2 entries=22 op=nft_register_rule pid=3272 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:15.908929 kubelet[1451]: I0515 10:40:15.908905 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/b83aed7b-8fde-497b-a230-bf55f9919e58-data\") pod \"nfs-server-provisioner-0\" (UID: \"b83aed7b-8fde-497b-a230-bf55f9919e58\") " pod="default/nfs-server-provisioner-0" May 15 10:40:15.909031 kubelet[1451]: I0515 10:40:15.908939 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ff27b\" (UniqueName: \"kubernetes.io/projected/b83aed7b-8fde-497b-a230-bf55f9919e58-kube-api-access-ff27b\") pod \"nfs-server-provisioner-0\" (UID: \"b83aed7b-8fde-497b-a230-bf55f9919e58\") " pod="default/nfs-server-provisioner-0" May 15 10:40:16.065050 kubelet[1451]: E0515 10:40:16.064972 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:40:16.141036 env[1202]: time="2025-05-15T10:40:16.140985889Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:b83aed7b-8fde-497b-a230-bf55f9919e58,Namespace:default,Attempt:0,}" May 15 10:40:16.269074 systemd-networkd[1020]: cali60e51b789ff: Link UP May 15 10:40:16.271710 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 10:40:16.271782 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready May 15 10:40:16.271973 systemd-networkd[1020]: cali60e51b789ff: Gained carrier May 15 10:40:16.281808 env[1202]: 2025-05-15 10:40:16.205 [INFO][3275] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.55-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default b83aed7b-8fde-497b-a230-bf55f9919e58 1306 0 2025-05-15 10:40:15 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.0.0.55 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="9f09f2fb7326698fb24619376293f31af654b1246ac15fedc24f5ce3cdcc22e1" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.55-k8s-nfs--server--provisioner--0-" May 15 10:40:16.281808 env[1202]: 2025-05-15 10:40:16.205 [INFO][3275] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="9f09f2fb7326698fb24619376293f31af654b1246ac15fedc24f5ce3cdcc22e1" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.55-k8s-nfs--server--provisioner--0-eth0" May 15 10:40:16.281808 env[1202]: 2025-05-15 10:40:16.234 [INFO][3289] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9f09f2fb7326698fb24619376293f31af654b1246ac15fedc24f5ce3cdcc22e1" HandleID="k8s-pod-network.9f09f2fb7326698fb24619376293f31af654b1246ac15fedc24f5ce3cdcc22e1" Workload="10.0.0.55-k8s-nfs--server--provisioner--0-eth0" May 15 10:40:16.281808 env[1202]: 2025-05-15 10:40:16.243 [INFO][3289] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="9f09f2fb7326698fb24619376293f31af654b1246ac15fedc24f5ce3cdcc22e1" HandleID="k8s-pod-network.9f09f2fb7326698fb24619376293f31af654b1246ac15fedc24f5ce3cdcc22e1" Workload="10.0.0.55-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002c7b60), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.55", "pod":"nfs-server-provisioner-0", "timestamp":"2025-05-15 10:40:16.234375169 +0000 UTC"}, Hostname:"10.0.0.55", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:40:16.281808 env[1202]: 2025-05-15 10:40:16.244 [INFO][3289] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:40:16.281808 env[1202]: 2025-05-15 10:40:16.244 [INFO][3289] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:40:16.281808 env[1202]: 2025-05-15 10:40:16.244 [INFO][3289] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.55' May 15 10:40:16.281808 env[1202]: 2025-05-15 10:40:16.245 [INFO][3289] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.9f09f2fb7326698fb24619376293f31af654b1246ac15fedc24f5ce3cdcc22e1" host="10.0.0.55" May 15 10:40:16.281808 env[1202]: 2025-05-15 10:40:16.248 [INFO][3289] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.55" May 15 10:40:16.281808 env[1202]: 2025-05-15 10:40:16.252 [INFO][3289] ipam/ipam.go 489: Trying affinity for 192.168.23.192/26 host="10.0.0.55" May 15 10:40:16.281808 env[1202]: 2025-05-15 10:40:16.254 [INFO][3289] ipam/ipam.go 155: Attempting to load block cidr=192.168.23.192/26 host="10.0.0.55" May 15 10:40:16.281808 env[1202]: 2025-05-15 10:40:16.255 [INFO][3289] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.23.192/26 host="10.0.0.55" May 15 10:40:16.281808 env[1202]: 2025-05-15 10:40:16.255 [INFO][3289] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.23.192/26 handle="k8s-pod-network.9f09f2fb7326698fb24619376293f31af654b1246ac15fedc24f5ce3cdcc22e1" host="10.0.0.55" May 15 10:40:16.281808 env[1202]: 2025-05-15 10:40:16.256 [INFO][3289] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.9f09f2fb7326698fb24619376293f31af654b1246ac15fedc24f5ce3cdcc22e1 May 15 10:40:16.281808 env[1202]: 2025-05-15 10:40:16.260 [INFO][3289] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.23.192/26 handle="k8s-pod-network.9f09f2fb7326698fb24619376293f31af654b1246ac15fedc24f5ce3cdcc22e1" host="10.0.0.55" May 15 10:40:16.281808 env[1202]: 2025-05-15 10:40:16.265 [INFO][3289] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.23.195/26] block=192.168.23.192/26 handle="k8s-pod-network.9f09f2fb7326698fb24619376293f31af654b1246ac15fedc24f5ce3cdcc22e1" host="10.0.0.55" May 15 10:40:16.281808 env[1202]: 2025-05-15 10:40:16.265 [INFO][3289] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.23.195/26] handle="k8s-pod-network.9f09f2fb7326698fb24619376293f31af654b1246ac15fedc24f5ce3cdcc22e1" host="10.0.0.55" May 15 10:40:16.281808 env[1202]: 2025-05-15 10:40:16.265 [INFO][3289] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:40:16.281808 env[1202]: 2025-05-15 10:40:16.265 [INFO][3289] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.23.195/26] IPv6=[] ContainerID="9f09f2fb7326698fb24619376293f31af654b1246ac15fedc24f5ce3cdcc22e1" HandleID="k8s-pod-network.9f09f2fb7326698fb24619376293f31af654b1246ac15fedc24f5ce3cdcc22e1" Workload="10.0.0.55-k8s-nfs--server--provisioner--0-eth0" May 15 10:40:16.282603 env[1202]: 2025-05-15 10:40:16.267 [INFO][3275] cni-plugin/k8s.go 386: Populated endpoint ContainerID="9f09f2fb7326698fb24619376293f31af654b1246ac15fedc24f5ce3cdcc22e1" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.55-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.55-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"b83aed7b-8fde-497b-a230-bf55f9919e58", ResourceVersion:"1306", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 40, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.55", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.23.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:40:16.282603 env[1202]: 2025-05-15 10:40:16.267 [INFO][3275] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.23.195/32] ContainerID="9f09f2fb7326698fb24619376293f31af654b1246ac15fedc24f5ce3cdcc22e1" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.55-k8s-nfs--server--provisioner--0-eth0" May 15 10:40:16.282603 env[1202]: 2025-05-15 10:40:16.267 [INFO][3275] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="9f09f2fb7326698fb24619376293f31af654b1246ac15fedc24f5ce3cdcc22e1" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.55-k8s-nfs--server--provisioner--0-eth0" May 15 10:40:16.282603 env[1202]: 2025-05-15 10:40:16.271 [INFO][3275] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="9f09f2fb7326698fb24619376293f31af654b1246ac15fedc24f5ce3cdcc22e1" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.55-k8s-nfs--server--provisioner--0-eth0" May 15 10:40:16.282847 env[1202]: 2025-05-15 10:40:16.272 [INFO][3275] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="9f09f2fb7326698fb24619376293f31af654b1246ac15fedc24f5ce3cdcc22e1" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.55-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.55-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"b83aed7b-8fde-497b-a230-bf55f9919e58", ResourceVersion:"1306", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 40, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.55", ContainerID:"9f09f2fb7326698fb24619376293f31af654b1246ac15fedc24f5ce3cdcc22e1", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.23.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"66:27:0e:23:52:cd", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:40:16.282847 env[1202]: 2025-05-15 10:40:16.280 [INFO][3275] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="9f09f2fb7326698fb24619376293f31af654b1246ac15fedc24f5ce3cdcc22e1" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.55-k8s-nfs--server--provisioner--0-eth0" May 15 10:40:16.290000 audit[3311]: NETFILTER_CFG table=filter:91 family=2 entries=44 op=nft_register_chain pid=3311 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:40:16.290000 audit[3311]: SYSCALL arch=c000003e syscall=46 success=yes exit=22672 a0=3 a1=7ffe4f01de00 a2=0 a3=7ffe4f01ddec items=0 ppid=2660 pid=3311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:16.290000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:40:16.365275 env[1202]: time="2025-05-15T10:40:16.365210932Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:40:16.365275 env[1202]: time="2025-05-15T10:40:16.365253552Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:40:16.365275 env[1202]: time="2025-05-15T10:40:16.365265915Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:40:16.365516 env[1202]: time="2025-05-15T10:40:16.365428380Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9f09f2fb7326698fb24619376293f31af654b1246ac15fedc24f5ce3cdcc22e1 pid=3319 runtime=io.containerd.runc.v2 May 15 10:40:16.377201 systemd[1]: Started cri-containerd-9f09f2fb7326698fb24619376293f31af654b1246ac15fedc24f5ce3cdcc22e1.scope. May 15 10:40:16.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:16.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:16.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:16.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:16.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:16.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:16.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:16.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:16.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:16.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:16.386000 audit: BPF prog-id=134 op=LOAD May 15 10:40:16.386000 audit[3328]: AVC avc: denied { bpf } for pid=3328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:16.386000 audit[3328]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3319 pid=3328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:16.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966303966326662373332363639386662323436313933373632393366 May 15 10:40:16.386000 audit[3328]: AVC avc: denied { perfmon } for pid=3328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:16.386000 audit[3328]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3319 pid=3328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:16.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966303966326662373332363639386662323436313933373632393366 May 15 10:40:16.386000 audit[3328]: AVC avc: denied { bpf } for pid=3328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:16.386000 audit[3328]: AVC avc: denied { bpf } for pid=3328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:16.386000 audit[3328]: AVC avc: denied { bpf } for pid=3328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:16.386000 audit[3328]: AVC avc: denied { perfmon } for pid=3328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:16.386000 audit[3328]: AVC avc: denied { perfmon } for pid=3328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:16.386000 audit[3328]: AVC avc: denied { perfmon } for pid=3328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:16.386000 audit[3328]: AVC avc: denied { perfmon } for pid=3328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:16.386000 audit[3328]: AVC avc: denied { perfmon } for pid=3328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:16.386000 audit[3328]: AVC avc: denied { bpf } for pid=3328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:16.386000 audit[3328]: AVC avc: denied { bpf } for pid=3328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:16.386000 audit: BPF prog-id=135 op=LOAD May 15 10:40:16.386000 audit[3328]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00039d5e0 items=0 ppid=3319 pid=3328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:16.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966303966326662373332363639386662323436313933373632393366 May 15 10:40:16.386000 audit[3328]: AVC avc: denied { bpf } for pid=3328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:16.386000 audit[3328]: AVC avc: denied { bpf } for pid=3328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:16.386000 audit[3328]: AVC avc: denied { perfmon } for pid=3328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:16.386000 audit[3328]: AVC avc: denied { perfmon } for pid=3328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:16.386000 audit[3328]: AVC avc: denied { perfmon } for pid=3328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:16.386000 audit[3328]: AVC avc: denied { perfmon } for pid=3328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:16.386000 audit[3328]: AVC avc: denied { perfmon } for pid=3328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:16.386000 audit[3328]: AVC avc: denied { bpf } for pid=3328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:16.386000 audit[3328]: AVC avc: denied { bpf } for pid=3328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:16.386000 audit: BPF prog-id=136 op=LOAD May 15 10:40:16.386000 audit[3328]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00039d628 items=0 ppid=3319 pid=3328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:16.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966303966326662373332363639386662323436313933373632393366 May 15 10:40:16.386000 audit: BPF prog-id=136 op=UNLOAD May 15 10:40:16.386000 audit: BPF prog-id=135 op=UNLOAD May 15 10:40:16.387000 audit[3328]: AVC avc: denied { bpf } for pid=3328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:16.387000 audit[3328]: AVC avc: denied { bpf } for pid=3328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:16.387000 audit[3328]: AVC avc: denied { bpf } for pid=3328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:16.387000 audit[3328]: AVC avc: denied { perfmon } for pid=3328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:16.387000 audit[3328]: AVC avc: denied { perfmon } for pid=3328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:16.387000 audit[3328]: AVC avc: denied { perfmon } for pid=3328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:16.387000 audit[3328]: AVC avc: denied { perfmon } for pid=3328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:16.387000 audit[3328]: AVC avc: denied { perfmon } for pid=3328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:16.387000 audit[3328]: AVC avc: denied { bpf } for pid=3328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:16.387000 audit[3328]: AVC avc: denied { bpf } for pid=3328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:16.387000 audit: BPF prog-id=137 op=LOAD May 15 10:40:16.387000 audit[3328]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00039da38 items=0 ppid=3319 pid=3328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:16.387000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966303966326662373332363639386662323436313933373632393366 May 15 10:40:16.388456 systemd-resolved[1140]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:40:16.408526 env[1202]: time="2025-05-15T10:40:16.408469634Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:b83aed7b-8fde-497b-a230-bf55f9919e58,Namespace:default,Attempt:0,} returns sandbox id \"9f09f2fb7326698fb24619376293f31af654b1246ac15fedc24f5ce3cdcc22e1\"" May 15 10:40:16.410397 env[1202]: time="2025-05-15T10:40:16.410370007Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" May 15 10:40:17.065686 kubelet[1451]: E0515 10:40:17.065637 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:40:17.812475 systemd[1]: run-containerd-runc-k8s.io-bd639183a6cf7045f2e81d6790be3ae0cb1d1b3ecb9cfe8e2906a019eed9f849-runc.1nzYwt.mount: Deactivated successfully. May 15 10:40:17.854196 kubelet[1451]: E0515 10:40:17.854160 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:40:18.066469 kubelet[1451]: E0515 10:40:18.066345 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:40:18.125067 systemd-networkd[1020]: cali60e51b789ff: Gained IPv6LL May 15 10:40:18.776173 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4034724351.mount: Deactivated successfully. May 15 10:40:19.067524 kubelet[1451]: E0515 10:40:19.067260 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:40:20.068297 kubelet[1451]: E0515 10:40:20.068239 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:40:21.069399 kubelet[1451]: E0515 10:40:21.069369 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:40:21.154560 env[1202]: time="2025-05-15T10:40:21.154502767Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:21.158568 env[1202]: time="2025-05-15T10:40:21.158518360Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:21.160426 env[1202]: time="2025-05-15T10:40:21.160396342Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:21.162503 env[1202]: time="2025-05-15T10:40:21.162476042Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:21.163281 env[1202]: time="2025-05-15T10:40:21.163241994Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" May 15 10:40:21.166493 env[1202]: time="2025-05-15T10:40:21.166466428Z" level=info msg="CreateContainer within sandbox \"9f09f2fb7326698fb24619376293f31af654b1246ac15fedc24f5ce3cdcc22e1\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" May 15 10:40:21.178239 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3259384785.mount: Deactivated successfully. May 15 10:40:21.181566 env[1202]: time="2025-05-15T10:40:21.181523469Z" level=info msg="CreateContainer within sandbox \"9f09f2fb7326698fb24619376293f31af654b1246ac15fedc24f5ce3cdcc22e1\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"9afde35cf71b3c3a0170d917e2710c93c5f15307a67cf0c10759d874bc0ee212\"" May 15 10:40:21.182117 env[1202]: time="2025-05-15T10:40:21.182083743Z" level=info msg="StartContainer for \"9afde35cf71b3c3a0170d917e2710c93c5f15307a67cf0c10759d874bc0ee212\"" May 15 10:40:21.198103 systemd[1]: Started cri-containerd-9afde35cf71b3c3a0170d917e2710c93c5f15307a67cf0c10759d874bc0ee212.scope. May 15 10:40:21.206000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:21.208900 kernel: kauditd_printk_skb: 62 callbacks suppressed May 15 10:40:21.208970 kernel: audit: type=1400 audit(1747305621.206:779): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:21.206000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:21.216412 kernel: audit: type=1400 audit(1747305621.206:780): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:21.216474 kernel: audit: type=1400 audit(1747305621.206:781): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:21.206000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:21.206000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:21.222974 kernel: audit: type=1400 audit(1747305621.206:782): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:21.223022 kernel: audit: type=1400 audit(1747305621.206:783): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:21.206000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:21.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:21.228748 kernel: audit: type=1400 audit(1747305621.207:784): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:21.228796 kernel: audit: type=1400 audit(1747305621.207:785): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:21.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:21.231615 kernel: audit: type=1400 audit(1747305621.207:786): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:21.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:21.234470 kernel: audit: type=1400 audit(1747305621.207:787): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:21.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:21.237354 kernel: audit: type=1400 audit(1747305621.215:788): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:21.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:21.215000 audit: BPF prog-id=138 op=LOAD May 15 10:40:21.215000 audit[3383]: AVC avc: denied { bpf } for pid=3383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:21.215000 audit[3383]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3319 pid=3383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:21.215000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961666465333563663731623363336130313730643931376532373130 May 15 10:40:21.216000 audit[3383]: AVC avc: denied { perfmon } for pid=3383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:21.216000 audit[3383]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3319 pid=3383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:21.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961666465333563663731623363336130313730643931376532373130 May 15 10:40:21.216000 audit[3383]: AVC avc: denied { bpf } for pid=3383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:21.216000 audit[3383]: AVC avc: denied { bpf } for pid=3383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:21.216000 audit[3383]: AVC avc: denied { bpf } for pid=3383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:21.216000 audit[3383]: AVC avc: denied { perfmon } for pid=3383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:21.216000 audit[3383]: AVC avc: denied { perfmon } for pid=3383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:21.216000 audit[3383]: AVC avc: denied { perfmon } for pid=3383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:21.216000 audit[3383]: AVC avc: denied { perfmon } for pid=3383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:21.216000 audit[3383]: AVC avc: denied { perfmon } for pid=3383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:21.216000 audit[3383]: AVC avc: denied { bpf } for pid=3383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:21.216000 audit[3383]: AVC avc: denied { bpf } for pid=3383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:21.216000 audit: BPF prog-id=139 op=LOAD May 15 10:40:21.216000 audit[3383]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000394230 items=0 ppid=3319 pid=3383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:21.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961666465333563663731623363336130313730643931376532373130 May 15 10:40:21.222000 audit[3383]: AVC avc: denied { bpf } for pid=3383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:21.222000 audit[3383]: AVC avc: denied { bpf } for pid=3383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:21.222000 audit[3383]: AVC avc: denied { perfmon } for pid=3383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:21.222000 audit[3383]: AVC avc: denied { perfmon } for pid=3383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:21.222000 audit[3383]: AVC avc: denied { perfmon } for pid=3383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:21.222000 audit[3383]: AVC avc: denied { perfmon } for pid=3383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:21.222000 audit[3383]: AVC avc: denied { perfmon } for pid=3383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:21.222000 audit[3383]: AVC avc: denied { bpf } for pid=3383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:21.222000 audit[3383]: AVC avc: denied { bpf } for pid=3383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:21.222000 audit: BPF prog-id=140 op=LOAD May 15 10:40:21.222000 audit[3383]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000394278 items=0 ppid=3319 pid=3383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:21.222000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961666465333563663731623363336130313730643931376532373130 May 15 10:40:21.228000 audit: BPF prog-id=140 op=UNLOAD May 15 10:40:21.228000 audit: BPF prog-id=139 op=UNLOAD May 15 10:40:21.228000 audit[3383]: AVC avc: denied { bpf } for pid=3383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:21.228000 audit[3383]: AVC avc: denied { bpf } for pid=3383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:21.228000 audit[3383]: AVC avc: denied { bpf } for pid=3383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:21.228000 audit[3383]: AVC avc: denied { perfmon } for pid=3383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:21.228000 audit[3383]: AVC avc: denied { perfmon } for pid=3383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:21.228000 audit[3383]: AVC avc: denied { perfmon } for pid=3383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:21.228000 audit[3383]: AVC avc: denied { perfmon } for pid=3383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:21.228000 audit[3383]: AVC avc: denied { perfmon } for pid=3383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:21.228000 audit[3383]: AVC avc: denied { bpf } for pid=3383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:21.228000 audit[3383]: AVC avc: denied { bpf } for pid=3383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:21.228000 audit: BPF prog-id=141 op=LOAD May 15 10:40:21.228000 audit[3383]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000394688 items=0 ppid=3319 pid=3383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:21.228000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961666465333563663731623363336130313730643931376532373130 May 15 10:40:21.251213 env[1202]: time="2025-05-15T10:40:21.251165916Z" level=info msg="StartContainer for \"9afde35cf71b3c3a0170d917e2710c93c5f15307a67cf0c10759d874bc0ee212\" returns successfully" May 15 10:40:21.287000 audit[3412]: AVC avc: denied { search } for pid=3412 comm="rpcbind" name="crypto" dev="proc" ino=23043 scontext=system_u:system_r:svirt_lxc_net_t:s0:c367,c733 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 15 10:40:21.287000 audit[3412]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fa7799a80c0 a2=0 a3=0 items=0 ppid=3394 pid=3412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c367,c733 key=(null) May 15 10:40:21.287000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 May 15 10:40:21.318000 audit[3419]: AVC avc: denied { search } for pid=3419 comm="dbus-daemon" name="crypto" dev="proc" ino=23043 scontext=system_u:system_r:svirt_lxc_net_t:s0:c367,c733 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 15 10:40:21.318000 audit[3419]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fee470530c0 a2=0 a3=0 items=0 ppid=3394 pid=3419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c367,c733 key=(null) May 15 10:40:21.318000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 15 10:40:21.321000 audit[3420]: AVC avc: denied { watch } for pid=3420 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c367,c733 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c367,c733 tclass=dir permissive=0 May 15 10:40:21.321000 audit[3420]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=5558bb1cb800 a2=2c8 a3=7fff431f4eac items=0 ppid=3394 pid=3420 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c367,c733 key=(null) May 15 10:40:21.321000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 15 10:40:21.324000 audit[3421]: AVC avc: denied { read } for pid=3421 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=25880 scontext=system_u:system_r:svirt_lxc_net_t:s0:c367,c733 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 May 15 10:40:21.324000 audit[3421]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7fdfe24ad320 a1=80000 a2=d a3=7fff41584250 items=0 ppid=3394 pid=3421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c367,c733 key=(null) May 15 10:40:21.324000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 15 10:40:21.325000 audit[3421]: AVC avc: denied { search } for pid=3421 comm="ganesha.nfsd" name="crypto" dev="proc" ino=23043 scontext=system_u:system_r:svirt_lxc_net_t:s0:c367,c733 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 15 10:40:21.325000 audit[3421]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fdfe1a010c0 a2=0 a3=0 items=0 ppid=3394 pid=3421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c367,c733 key=(null) May 15 10:40:21.325000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 15 10:40:21.359184 kubelet[1451]: I0515 10:40:21.359115 1451 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.6047226079999999 podStartE2EDuration="6.359095939s" podCreationTimestamp="2025-05-15 10:40:15 +0000 UTC" firstStartedPulling="2025-05-15 10:40:16.409880529 +0000 UTC m=+86.473114013" lastFinishedPulling="2025-05-15 10:40:21.16425387 +0000 UTC m=+91.227487344" observedRunningTime="2025-05-15 10:40:21.358675045 +0000 UTC m=+91.421908529" watchObservedRunningTime="2025-05-15 10:40:21.359095939 +0000 UTC m=+91.422329413" May 15 10:40:21.371000 audit[3437]: NETFILTER_CFG table=filter:92 family=2 entries=20 op=nft_register_rule pid=3437 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:21.371000 audit[3437]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe08898a40 a2=0 a3=7ffe08898a2c items=0 ppid=1729 pid=3437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:21.371000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:21.377000 audit[3437]: NETFILTER_CFG table=nat:93 family=2 entries=106 op=nft_register_chain pid=3437 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:21.377000 audit[3437]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffe08898a40 a2=0 a3=7ffe08898a2c items=0 ppid=1729 pid=3437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:21.377000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:22.069570 kubelet[1451]: E0515 10:40:22.069499 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:40:23.070083 kubelet[1451]: E0515 10:40:23.070032 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:40:24.071094 kubelet[1451]: E0515 10:40:24.071023 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:40:25.072035 kubelet[1451]: E0515 10:40:25.071969 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:40:25.990620 kubelet[1451]: E0515 10:40:25.990545 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:40:26.073054 kubelet[1451]: E0515 10:40:26.073005 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:40:27.073542 kubelet[1451]: E0515 10:40:27.073486 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:40:28.074044 kubelet[1451]: E0515 10:40:28.073995 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:40:29.075027 kubelet[1451]: E0515 10:40:29.074956 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:40:30.075608 kubelet[1451]: E0515 10:40:30.075540 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:40:30.900288 kubelet[1451]: I0515 10:40:30.900239 1451 topology_manager.go:215] "Topology Admit Handler" podUID="fc1a1ab1-2d19-4816-98db-7709adf2d398" podNamespace="default" podName="test-pod-1" May 15 10:40:30.904153 systemd[1]: Created slice kubepods-besteffort-podfc1a1ab1_2d19_4816_98db_7709adf2d398.slice. May 15 10:40:31.002153 kubelet[1451]: E0515 10:40:31.002126 1451 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:40:31.075789 kubelet[1451]: E0515 10:40:31.075687 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:40:31.082918 kubelet[1451]: I0515 10:40:31.082883 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-02b12d30-259a-44cd-b3a4-e86d96e34e0f\" (UniqueName: \"kubernetes.io/nfs/fc1a1ab1-2d19-4816-98db-7709adf2d398-pvc-02b12d30-259a-44cd-b3a4-e86d96e34e0f\") pod \"test-pod-1\" (UID: \"fc1a1ab1-2d19-4816-98db-7709adf2d398\") " pod="default/test-pod-1" May 15 10:40:31.083013 kubelet[1451]: I0515 10:40:31.082926 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fw267\" (UniqueName: \"kubernetes.io/projected/fc1a1ab1-2d19-4816-98db-7709adf2d398-kube-api-access-fw267\") pod \"test-pod-1\" (UID: \"fc1a1ab1-2d19-4816-98db-7709adf2d398\") " pod="default/test-pod-1" May 15 10:40:31.193000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.196481 kernel: Failed to create system directory netfs May 15 10:40:31.196533 kernel: kauditd_printk_skb: 68 callbacks suppressed May 15 10:40:31.196559 kernel: audit: type=1400 audit(1747305631.193:804): avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.196577 kernel: Failed to create system directory netfs May 15 10:40:31.197359 kernel: audit: type=1400 audit(1747305631.193:804): avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.193000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.193000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.206164 kernel: Failed to create system directory netfs May 15 10:40:31.206205 kernel: audit: type=1400 audit(1747305631.193:804): avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.206227 kernel: Failed to create system directory netfs May 15 10:40:31.209791 kernel: audit: type=1400 audit(1747305631.193:804): avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.193000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.193000 audit[3453]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55c3739965e0 a1=153bc a2=55c35ba9e2b0 a3=5 items=0 ppid=61 pid=3453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:31.193000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 15 10:40:31.222974 kernel: audit: type=1300 audit(1747305631.193:804): arch=c000003e syscall=175 success=yes exit=0 a0=55c3739965e0 a1=153bc a2=55c35ba9e2b0 a3=5 items=0 ppid=61 pid=3453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:31.223047 kernel: audit: type=1327 audit(1747305631.193:804): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 15 10:40:31.218000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.223905 kernel: Failed to create system directory fscache May 15 10:40:31.223948 kernel: audit: type=1400 audit(1747305631.218:805): avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.223974 kernel: Failed to create system directory fscache May 15 10:40:31.223987 kernel: Failed to create system directory fscache May 15 10:40:31.224001 kernel: Failed to create system directory fscache May 15 10:40:31.224014 kernel: Failed to create system directory fscache May 15 10:40:31.218000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.228867 kernel: audit: type=1400 audit(1747305631.218:805): avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.228896 kernel: Failed to create system directory fscache May 15 10:40:31.218000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.230431 kernel: audit: type=1400 audit(1747305631.218:805): avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.230481 kernel: Failed to create system directory fscache May 15 10:40:31.231220 kernel: audit: type=1400 audit(1747305631.218:805): avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.218000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.234408 kernel: Failed to create system directory fscache May 15 10:40:31.218000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.218000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.218000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.218000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.218000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.218000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.244481 kernel: Failed to create system directory fscache May 15 10:40:31.244517 kernel: Failed to create system directory fscache May 15 10:40:31.244530 kernel: Failed to create system directory fscache May 15 10:40:31.218000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.218000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.245966 kernel: Failed to create system directory fscache May 15 10:40:31.246005 kernel: Failed to create system directory fscache May 15 10:40:31.218000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.218000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.247420 kernel: Failed to create system directory fscache May 15 10:40:31.218000 audit[3453]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55c373bab9c0 a1=4c0fc a2=55c35ba9e2b0 a3=5 items=0 ppid=61 pid=3453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:31.218000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 15 10:40:31.249851 kernel: FS-Cache: Loaded May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.320513 kernel: Failed to create system directory sunrpc May 15 10:40:31.320559 kernel: Failed to create system directory sunrpc May 15 10:40:31.320582 kernel: Failed to create system directory sunrpc May 15 10:40:31.320607 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.321240 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.323372 kernel: Failed to create system directory sunrpc May 15 10:40:31.323408 kernel: Failed to create system directory sunrpc May 15 10:40:31.323437 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.325556 kernel: Failed to create system directory sunrpc May 15 10:40:31.325600 kernel: Failed to create system directory sunrpc May 15 10:40:31.325622 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.327024 kernel: Failed to create system directory sunrpc May 15 10:40:31.327063 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.328448 kernel: Failed to create system directory sunrpc May 15 10:40:31.328477 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.329917 kernel: Failed to create system directory sunrpc May 15 10:40:31.329962 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.331317 kernel: Failed to create system directory sunrpc May 15 10:40:31.331354 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.333529 kernel: Failed to create system directory sunrpc May 15 10:40:31.333575 kernel: Failed to create system directory sunrpc May 15 10:40:31.333599 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.334242 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.334971 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.336404 kernel: Failed to create system directory sunrpc May 15 10:40:31.336461 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.337948 kernel: Failed to create system directory sunrpc May 15 10:40:31.337996 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.339397 kernel: Failed to create system directory sunrpc May 15 10:40:31.339441 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.340863 kernel: Failed to create system directory sunrpc May 15 10:40:31.340911 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.342385 kernel: Failed to create system directory sunrpc May 15 10:40:31.342428 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.343860 kernel: Failed to create system directory sunrpc May 15 10:40:31.343896 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.345329 kernel: Failed to create system directory sunrpc May 15 10:40:31.345366 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.347552 kernel: Failed to create system directory sunrpc May 15 10:40:31.347584 kernel: Failed to create system directory sunrpc May 15 10:40:31.347603 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.349103 kernel: Failed to create system directory sunrpc May 15 10:40:31.349135 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.351364 kernel: Failed to create system directory sunrpc May 15 10:40:31.351395 kernel: Failed to create system directory sunrpc May 15 10:40:31.351413 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.352939 kernel: Failed to create system directory sunrpc May 15 10:40:31.352969 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.354427 kernel: Failed to create system directory sunrpc May 15 10:40:31.354457 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.355987 kernel: Failed to create system directory sunrpc May 15 10:40:31.356016 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.357500 kernel: Failed to create system directory sunrpc May 15 10:40:31.357534 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.359006 kernel: Failed to create system directory sunrpc May 15 10:40:31.359043 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.360552 kernel: Failed to create system directory sunrpc May 15 10:40:31.360591 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.362081 kernel: Failed to create system directory sunrpc May 15 10:40:31.362127 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.364375 kernel: Failed to create system directory sunrpc May 15 10:40:31.364409 kernel: Failed to create system directory sunrpc May 15 10:40:31.364430 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.366026 kernel: Failed to create system directory sunrpc May 15 10:40:31.366047 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.367494 kernel: Failed to create system directory sunrpc May 15 10:40:31.367529 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.368974 kernel: Failed to create system directory sunrpc May 15 10:40:31.368996 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.370421 kernel: Failed to create system directory sunrpc May 15 10:40:31.370441 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.371954 kernel: Failed to create system directory sunrpc May 15 10:40:31.371995 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.373443 kernel: Failed to create system directory sunrpc May 15 10:40:31.373462 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.375059 kernel: Failed to create system directory sunrpc May 15 10:40:31.375086 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.376503 kernel: Failed to create system directory sunrpc May 15 10:40:31.376533 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.377981 kernel: Failed to create system directory sunrpc May 15 10:40:31.378001 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.379429 kernel: Failed to create system directory sunrpc May 15 10:40:31.379454 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.380985 kernel: Failed to create system directory sunrpc May 15 10:40:31.381049 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.382530 kernel: Failed to create system directory sunrpc May 15 10:40:31.382558 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.384064 kernel: Failed to create system directory sunrpc May 15 10:40:31.384096 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.386414 kernel: Failed to create system directory sunrpc May 15 10:40:31.386447 kernel: Failed to create system directory sunrpc May 15 10:40:31.386465 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.387942 kernel: Failed to create system directory sunrpc May 15 10:40:31.387979 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.389427 kernel: Failed to create system directory sunrpc May 15 10:40:31.389457 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.390982 kernel: Failed to create system directory sunrpc May 15 10:40:31.391013 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.392521 kernel: Failed to create system directory sunrpc May 15 10:40:31.392550 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.394024 kernel: Failed to create system directory sunrpc May 15 10:40:31.394049 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.395472 kernel: Failed to create system directory sunrpc May 15 10:40:31.395489 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.396952 kernel: Failed to create system directory sunrpc May 15 10:40:31.396970 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.398407 kernel: Failed to create system directory sunrpc May 15 10:40:31.398436 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.399886 kernel: Failed to create system directory sunrpc May 15 10:40:31.399906 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.401390 kernel: Failed to create system directory sunrpc May 15 10:40:31.401449 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.402223 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.404473 kernel: Failed to create system directory sunrpc May 15 10:40:31.404504 kernel: Failed to create system directory sunrpc May 15 10:40:31.404523 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.406030 kernel: Failed to create system directory sunrpc May 15 10:40:31.406068 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.408317 kernel: Failed to create system directory sunrpc May 15 10:40:31.408366 kernel: Failed to create system directory sunrpc May 15 10:40:31.408386 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.409838 kernel: Failed to create system directory sunrpc May 15 10:40:31.409869 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.411300 kernel: Failed to create system directory sunrpc May 15 10:40:31.411329 kernel: Failed to create system directory sunrpc May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.308000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.412880 kernel: Failed to create system directory sunrpc May 15 10:40:31.421976 kernel: RPC: Registered named UNIX socket transport module. May 15 10:40:31.422034 kernel: RPC: Registered udp transport module. May 15 10:40:31.422057 kernel: RPC: Registered tcp transport module. May 15 10:40:31.423539 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. May 15 10:40:31.308000 audit[3453]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55c373bf7ad0 a1=1a814c a2=55c35ba9e2b0 a3=5 items=6 ppid=61 pid=3453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:31.308000 audit: CWD cwd="/" May 15 10:40:31.308000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:40:31.308000 audit: PATH item=1 name=(null) inode=23160 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:40:31.308000 audit: PATH item=2 name=(null) inode=23160 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:40:31.308000 audit: PATH item=3 name=(null) inode=23161 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:40:31.308000 audit: PATH item=4 name=(null) inode=23160 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:40:31.308000 audit: PATH item=5 name=(null) inode=23162 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:40:31.308000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.459354 kernel: Failed to create system directory nfs May 15 10:40:31.459414 kernel: Failed to create system directory nfs May 15 10:40:31.459452 kernel: Failed to create system directory nfs May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.461418 kernel: Failed to create system directory nfs May 15 10:40:31.461451 kernel: Failed to create system directory nfs May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.462171 kernel: Failed to create system directory nfs May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.464237 kernel: Failed to create system directory nfs May 15 10:40:31.464284 kernel: Failed to create system directory nfs May 15 10:40:31.464309 kernel: Failed to create system directory nfs May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.466321 kernel: Failed to create system directory nfs May 15 10:40:31.466358 kernel: Failed to create system directory nfs May 15 10:40:31.466380 kernel: Failed to create system directory nfs May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.468421 kernel: Failed to create system directory nfs May 15 10:40:31.468450 kernel: Failed to create system directory nfs May 15 10:40:31.468478 kernel: Failed to create system directory nfs May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.469837 kernel: Failed to create system directory nfs May 15 10:40:31.469865 kernel: Failed to create system directory nfs May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.471220 kernel: Failed to create system directory nfs May 15 10:40:31.471260 kernel: Failed to create system directory nfs May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.473334 kernel: Failed to create system directory nfs May 15 10:40:31.473379 kernel: Failed to create system directory nfs May 15 10:40:31.473396 kernel: Failed to create system directory nfs May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.475479 kernel: Failed to create system directory nfs May 15 10:40:31.475508 kernel: Failed to create system directory nfs May 15 10:40:31.475582 kernel: Failed to create system directory nfs May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.476901 kernel: Failed to create system directory nfs May 15 10:40:31.476929 kernel: Failed to create system directory nfs May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.478286 kernel: Failed to create system directory nfs May 15 10:40:31.478313 kernel: Failed to create system directory nfs May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.480374 kernel: Failed to create system directory nfs May 15 10:40:31.480399 kernel: Failed to create system directory nfs May 15 10:40:31.480420 kernel: Failed to create system directory nfs May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.482489 kernel: Failed to create system directory nfs May 15 10:40:31.482527 kernel: Failed to create system directory nfs May 15 10:40:31.482547 kernel: Failed to create system directory nfs May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.483893 kernel: Failed to create system directory nfs May 15 10:40:31.483920 kernel: Failed to create system directory nfs May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.485285 kernel: Failed to create system directory nfs May 15 10:40:31.485310 kernel: Failed to create system directory nfs May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.487394 kernel: Failed to create system directory nfs May 15 10:40:31.487427 kernel: Failed to create system directory nfs May 15 10:40:31.487460 kernel: Failed to create system directory nfs May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.489504 kernel: Failed to create system directory nfs May 15 10:40:31.489536 kernel: Failed to create system directory nfs May 15 10:40:31.489557 kernel: Failed to create system directory nfs May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.490929 kernel: Failed to create system directory nfs May 15 10:40:31.490971 kernel: Failed to create system directory nfs May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.492377 kernel: Failed to create system directory nfs May 15 10:40:31.492407 kernel: Failed to create system directory nfs May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.493855 kernel: Failed to create system directory nfs May 15 10:40:31.493886 kernel: Failed to create system directory nfs May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.495304 kernel: Failed to create system directory nfs May 15 10:40:31.495336 kernel: Failed to create system directory nfs May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.498310 kernel: Failed to create system directory nfs May 15 10:40:31.498348 kernel: Failed to create system directory nfs May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.500444 kernel: Failed to create system directory nfs May 15 10:40:31.500480 kernel: Failed to create system directory nfs May 15 10:40:31.500501 kernel: Failed to create system directory nfs May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.501987 kernel: Failed to create system directory nfs May 15 10:40:31.502024 kernel: Failed to create system directory nfs May 15 10:40:31.449000 audit[3453]: AVC avc: denied { confidentiality } for pid=3453 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.449000 audit[3453]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55c373e18a10 a1=16eae4 a2=55c35ba9e2b0 a3=5 items=0 ppid=61 pid=3453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:31.449000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 15 10:40:31.523840 kernel: FS-Cache: Netfs 'nfs' registered for caching May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.560213 kernel: Failed to create system directory nfs4 May 15 10:40:31.560276 kernel: Failed to create system directory nfs4 May 15 10:40:31.560298 kernel: Failed to create system directory nfs4 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.562355 kernel: Failed to create system directory nfs4 May 15 10:40:31.562384 kernel: Failed to create system directory nfs4 May 15 10:40:31.562404 kernel: Failed to create system directory nfs4 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.564493 kernel: Failed to create system directory nfs4 May 15 10:40:31.564521 kernel: Failed to create system directory nfs4 May 15 10:40:31.564542 kernel: Failed to create system directory nfs4 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.565968 kernel: Failed to create system directory nfs4 May 15 10:40:31.566000 kernel: Failed to create system directory nfs4 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.567396 kernel: Failed to create system directory nfs4 May 15 10:40:31.567424 kernel: Failed to create system directory nfs4 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.568922 kernel: Failed to create system directory nfs4 May 15 10:40:31.568960 kernel: Failed to create system directory nfs4 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.570351 kernel: Failed to create system directory nfs4 May 15 10:40:31.570380 kernel: Failed to create system directory nfs4 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.571839 kernel: Failed to create system directory nfs4 May 15 10:40:31.571896 kernel: Failed to create system directory nfs4 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.573335 kernel: Failed to create system directory nfs4 May 15 10:40:31.573366 kernel: Failed to create system directory nfs4 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.574864 kernel: Failed to create system directory nfs4 May 15 10:40:31.574888 kernel: Failed to create system directory nfs4 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.576265 kernel: Failed to create system directory nfs4 May 15 10:40:31.576301 kernel: Failed to create system directory nfs4 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.578438 kernel: Failed to create system directory nfs4 May 15 10:40:31.578459 kernel: Failed to create system directory nfs4 May 15 10:40:31.578478 kernel: Failed to create system directory nfs4 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.579915 kernel: Failed to create system directory nfs4 May 15 10:40:31.579950 kernel: Failed to create system directory nfs4 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.581365 kernel: Failed to create system directory nfs4 May 15 10:40:31.581403 kernel: Failed to create system directory nfs4 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.582888 kernel: Failed to create system directory nfs4 May 15 10:40:31.582923 kernel: Failed to create system directory nfs4 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.584326 kernel: Failed to create system directory nfs4 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.585080 kernel: Failed to create system directory nfs4 May 15 10:40:31.585109 kernel: Failed to create system directory nfs4 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.587438 kernel: Failed to create system directory nfs4 May 15 10:40:31.587459 kernel: Failed to create system directory nfs4 May 15 10:40:31.587478 kernel: Failed to create system directory nfs4 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.588924 kernel: Failed to create system directory nfs4 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.590372 kernel: Failed to create system directory nfs4 May 15 10:40:31.590399 kernel: Failed to create system directory nfs4 May 15 10:40:31.590427 kernel: Failed to create system directory nfs4 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.591851 kernel: Failed to create system directory nfs4 May 15 10:40:31.591880 kernel: Failed to create system directory nfs4 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.593331 kernel: Failed to create system directory nfs4 May 15 10:40:31.594075 kernel: Failed to create system directory nfs4 May 15 10:40:31.594108 kernel: Failed to create system directory nfs4 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.594853 kernel: Failed to create system directory nfs4 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.596325 kernel: Failed to create system directory nfs4 May 15 10:40:31.596364 kernel: Failed to create system directory nfs4 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.597844 kernel: Failed to create system directory nfs4 May 15 10:40:31.597882 kernel: Failed to create system directory nfs4 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.599256 kernel: Failed to create system directory nfs4 May 15 10:40:31.599295 kernel: Failed to create system directory nfs4 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.601479 kernel: Failed to create system directory nfs4 May 15 10:40:31.601517 kernel: Failed to create system directory nfs4 May 15 10:40:31.601538 kernel: Failed to create system directory nfs4 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.602950 kernel: Failed to create system directory nfs4 May 15 10:40:31.602979 kernel: Failed to create system directory nfs4 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.604371 kernel: Failed to create system directory nfs4 May 15 10:40:31.604408 kernel: Failed to create system directory nfs4 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.605839 kernel: Failed to create system directory nfs4 May 15 10:40:31.605870 kernel: Failed to create system directory nfs4 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.607289 kernel: Failed to create system directory nfs4 May 15 10:40:31.607318 kernel: Failed to create system directory nfs4 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.609505 kernel: Failed to create system directory nfs4 May 15 10:40:31.609535 kernel: Failed to create system directory nfs4 May 15 10:40:31.609564 kernel: Failed to create system directory nfs4 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.610997 kernel: Failed to create system directory nfs4 May 15 10:40:31.611038 kernel: Failed to create system directory nfs4 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.612430 kernel: Failed to create system directory nfs4 May 15 10:40:31.612456 kernel: Failed to create system directory nfs4 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.613906 kernel: Failed to create system directory nfs4 May 15 10:40:31.613931 kernel: Failed to create system directory nfs4 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.615408 kernel: Failed to create system directory nfs4 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.616188 kernel: Failed to create system directory nfs4 May 15 10:40:31.616231 kernel: Failed to create system directory nfs4 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.618358 kernel: Failed to create system directory nfs4 May 15 10:40:31.618385 kernel: Failed to create system directory nfs4 May 15 10:40:31.618399 kernel: Failed to create system directory nfs4 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.619839 kernel: Failed to create system directory nfs4 May 15 10:40:31.619872 kernel: Failed to create system directory nfs4 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.621403 kernel: Failed to create system directory nfs4 May 15 10:40:31.621453 kernel: Failed to create system directory nfs4 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.622955 kernel: Failed to create system directory nfs4 May 15 10:40:31.622988 kernel: Failed to create system directory nfs4 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.624467 kernel: Failed to create system directory nfs4 May 15 10:40:31.624496 kernel: Failed to create system directory nfs4 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.626044 kernel: Failed to create system directory nfs4 May 15 10:40:31.626096 kernel: Failed to create system directory nfs4 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.627506 kernel: Failed to create system directory nfs4 May 15 10:40:31.627543 kernel: Failed to create system directory nfs4 May 15 10:40:31.548000 audit[3458]: AVC avc: denied { confidentiality } for pid=3458 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.768303 kernel: NFS: Registering the id_resolver key type May 15 10:40:31.768436 kernel: Key type id_resolver registered May 15 10:40:31.768452 kernel: Key type id_legacy registered May 15 10:40:31.548000 audit[3458]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f843c410010 a1=209404 a2=562b0df692b0 a3=5 items=0 ppid=61 pid=3458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:31.548000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 May 15 10:40:31.777000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.777000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.781866 kernel: Failed to create system directory rpcgss May 15 10:40:31.781902 kernel: Failed to create system directory rpcgss May 15 10:40:31.781916 kernel: Failed to create system directory rpcgss May 15 10:40:31.777000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.777000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.783342 kernel: Failed to create system directory rpcgss May 15 10:40:31.783364 kernel: Failed to create system directory rpcgss May 15 10:40:31.777000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.777000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.777000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.785537 kernel: Failed to create system directory rpcgss May 15 10:40:31.785557 kernel: Failed to create system directory rpcgss May 15 10:40:31.785570 kernel: Failed to create system directory rpcgss May 15 10:40:31.777000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.777000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.787000 kernel: Failed to create system directory rpcgss May 15 10:40:31.787026 kernel: Failed to create system directory rpcgss May 15 10:40:31.777000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.777000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.788471 kernel: Failed to create system directory rpcgss May 15 10:40:31.788556 kernel: Failed to create system directory rpcgss May 15 10:40:31.777000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.777000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.789948 kernel: Failed to create system directory rpcgss May 15 10:40:31.789967 kernel: Failed to create system directory rpcgss May 15 10:40:31.777000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.777000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.791404 kernel: Failed to create system directory rpcgss May 15 10:40:31.791423 kernel: Failed to create system directory rpcgss May 15 10:40:31.777000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.777000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.792905 kernel: Failed to create system directory rpcgss May 15 10:40:31.792925 kernel: Failed to create system directory rpcgss May 15 10:40:31.777000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.777000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.794386 kernel: Failed to create system directory rpcgss May 15 10:40:31.794403 kernel: Failed to create system directory rpcgss May 15 10:40:31.777000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.777000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.795939 kernel: Failed to create system directory rpcgss May 15 10:40:31.795958 kernel: Failed to create system directory rpcgss May 15 10:40:31.777000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.777000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.797421 kernel: Failed to create system directory rpcgss May 15 10:40:31.797439 kernel: Failed to create system directory rpcgss May 15 10:40:31.777000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.798196 kernel: Failed to create system directory rpcgss May 15 10:40:31.777000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.777000 audit[3459]: AVC avc: denied { confidentiality } for pid=3459 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:40:31.799833 kernel: Failed to create system directory rpcgss May 15 10:40:31.777000 audit[3459]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f1f8db1a010 a1=70b64 a2=55a3354d72b0 a3=5 items=0 ppid=61 pid=3459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:31.777000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 May 15 10:40:31.811213 nfsidmap[3470]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' May 15 10:40:31.813803 nfsidmap[3473]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' May 15 10:40:31.824000 audit[1263]: AVC avc: denied { watch_reads } for pid=1263 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2833 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 15 10:40:31.824000 audit[1263]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5588f2f7ee00 a2=10 a3=9cfa5c2730dbe655 items=0 ppid=1 pid=1263 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:31.824000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 15 10:40:31.825000 audit[1263]: AVC avc: denied { watch_reads } for pid=1263 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2833 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 15 10:40:31.825000 audit[1263]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5588f2f7ee00 a2=10 a3=9cfa5c2730dbe655 items=0 ppid=1 pid=1263 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:31.825000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 15 10:40:31.825000 audit[1263]: AVC avc: denied { watch_reads } for pid=1263 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2833 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 15 10:40:31.825000 audit[1263]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5588f2f7ee00 a2=10 a3=9cfa5c2730dbe655 items=0 ppid=1 pid=1263 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:31.825000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 15 10:40:31.825000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2833 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 15 10:40:31.825000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2833 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 15 10:40:31.825000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2833 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 15 10:40:32.076699 kubelet[1451]: E0515 10:40:32.076583 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:40:32.106666 env[1202]: time="2025-05-15T10:40:32.106609420Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:fc1a1ab1-2d19-4816-98db-7709adf2d398,Namespace:default,Attempt:0,}" May 15 10:40:32.207674 systemd-networkd[1020]: cali5ec59c6bf6e: Link UP May 15 10:40:32.211261 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 10:40:32.211310 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready May 15 10:40:32.210893 systemd-networkd[1020]: cali5ec59c6bf6e: Gained carrier May 15 10:40:32.218613 env[1202]: 2025-05-15 10:40:32.149 [INFO][3478] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.55-k8s-test--pod--1-eth0 default fc1a1ab1-2d19-4816-98db-7709adf2d398 1384 0 2025-05-15 10:40:16 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.55 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="3ada8f1105570dbaf2864a88dc56c993efd333717eb305f93705efdbd9640264" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.55-k8s-test--pod--1-" May 15 10:40:32.218613 env[1202]: 2025-05-15 10:40:32.149 [INFO][3478] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="3ada8f1105570dbaf2864a88dc56c993efd333717eb305f93705efdbd9640264" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.55-k8s-test--pod--1-eth0" May 15 10:40:32.218613 env[1202]: 2025-05-15 10:40:32.173 [INFO][3494] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3ada8f1105570dbaf2864a88dc56c993efd333717eb305f93705efdbd9640264" HandleID="k8s-pod-network.3ada8f1105570dbaf2864a88dc56c993efd333717eb305f93705efdbd9640264" Workload="10.0.0.55-k8s-test--pod--1-eth0" May 15 10:40:32.218613 env[1202]: 2025-05-15 10:40:32.182 [INFO][3494] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="3ada8f1105570dbaf2864a88dc56c993efd333717eb305f93705efdbd9640264" HandleID="k8s-pod-network.3ada8f1105570dbaf2864a88dc56c993efd333717eb305f93705efdbd9640264" Workload="10.0.0.55-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000436a80), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.55", "pod":"test-pod-1", "timestamp":"2025-05-15 10:40:32.173517643 +0000 UTC"}, Hostname:"10.0.0.55", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:40:32.218613 env[1202]: 2025-05-15 10:40:32.182 [INFO][3494] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:40:32.218613 env[1202]: 2025-05-15 10:40:32.182 [INFO][3494] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:40:32.218613 env[1202]: 2025-05-15 10:40:32.182 [INFO][3494] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.55' May 15 10:40:32.218613 env[1202]: 2025-05-15 10:40:32.185 [INFO][3494] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3ada8f1105570dbaf2864a88dc56c993efd333717eb305f93705efdbd9640264" host="10.0.0.55" May 15 10:40:32.218613 env[1202]: 2025-05-15 10:40:32.188 [INFO][3494] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.55" May 15 10:40:32.218613 env[1202]: 2025-05-15 10:40:32.191 [INFO][3494] ipam/ipam.go 489: Trying affinity for 192.168.23.192/26 host="10.0.0.55" May 15 10:40:32.218613 env[1202]: 2025-05-15 10:40:32.193 [INFO][3494] ipam/ipam.go 155: Attempting to load block cidr=192.168.23.192/26 host="10.0.0.55" May 15 10:40:32.218613 env[1202]: 2025-05-15 10:40:32.195 [INFO][3494] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.23.192/26 host="10.0.0.55" May 15 10:40:32.218613 env[1202]: 2025-05-15 10:40:32.195 [INFO][3494] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.23.192/26 handle="k8s-pod-network.3ada8f1105570dbaf2864a88dc56c993efd333717eb305f93705efdbd9640264" host="10.0.0.55" May 15 10:40:32.218613 env[1202]: 2025-05-15 10:40:32.196 [INFO][3494] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.3ada8f1105570dbaf2864a88dc56c993efd333717eb305f93705efdbd9640264 May 15 10:40:32.218613 env[1202]: 2025-05-15 10:40:32.199 [INFO][3494] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.23.192/26 handle="k8s-pod-network.3ada8f1105570dbaf2864a88dc56c993efd333717eb305f93705efdbd9640264" host="10.0.0.55" May 15 10:40:32.218613 env[1202]: 2025-05-15 10:40:32.204 [INFO][3494] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.23.196/26] block=192.168.23.192/26 handle="k8s-pod-network.3ada8f1105570dbaf2864a88dc56c993efd333717eb305f93705efdbd9640264" host="10.0.0.55" May 15 10:40:32.218613 env[1202]: 2025-05-15 10:40:32.204 [INFO][3494] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.23.196/26] handle="k8s-pod-network.3ada8f1105570dbaf2864a88dc56c993efd333717eb305f93705efdbd9640264" host="10.0.0.55" May 15 10:40:32.218613 env[1202]: 2025-05-15 10:40:32.204 [INFO][3494] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:40:32.218613 env[1202]: 2025-05-15 10:40:32.204 [INFO][3494] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.23.196/26] IPv6=[] ContainerID="3ada8f1105570dbaf2864a88dc56c993efd333717eb305f93705efdbd9640264" HandleID="k8s-pod-network.3ada8f1105570dbaf2864a88dc56c993efd333717eb305f93705efdbd9640264" Workload="10.0.0.55-k8s-test--pod--1-eth0" May 15 10:40:32.218613 env[1202]: 2025-05-15 10:40:32.205 [INFO][3478] cni-plugin/k8s.go 386: Populated endpoint ContainerID="3ada8f1105570dbaf2864a88dc56c993efd333717eb305f93705efdbd9640264" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.55-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.55-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"fc1a1ab1-2d19-4816-98db-7709adf2d398", ResourceVersion:"1384", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 40, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.55", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.23.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:40:32.219309 env[1202]: 2025-05-15 10:40:32.206 [INFO][3478] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.23.196/32] ContainerID="3ada8f1105570dbaf2864a88dc56c993efd333717eb305f93705efdbd9640264" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.55-k8s-test--pod--1-eth0" May 15 10:40:32.219309 env[1202]: 2025-05-15 10:40:32.206 [INFO][3478] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="3ada8f1105570dbaf2864a88dc56c993efd333717eb305f93705efdbd9640264" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.55-k8s-test--pod--1-eth0" May 15 10:40:32.219309 env[1202]: 2025-05-15 10:40:32.210 [INFO][3478] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="3ada8f1105570dbaf2864a88dc56c993efd333717eb305f93705efdbd9640264" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.55-k8s-test--pod--1-eth0" May 15 10:40:32.219309 env[1202]: 2025-05-15 10:40:32.211 [INFO][3478] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="3ada8f1105570dbaf2864a88dc56c993efd333717eb305f93705efdbd9640264" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.55-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.55-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"fc1a1ab1-2d19-4816-98db-7709adf2d398", ResourceVersion:"1384", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 40, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.55", ContainerID:"3ada8f1105570dbaf2864a88dc56c993efd333717eb305f93705efdbd9640264", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.23.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"d6:49:f3:99:0a:5b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:40:32.219309 env[1202]: 2025-05-15 10:40:32.217 [INFO][3478] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="3ada8f1105570dbaf2864a88dc56c993efd333717eb305f93705efdbd9640264" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.55-k8s-test--pod--1-eth0" May 15 10:40:32.227000 audit[3515]: NETFILTER_CFG table=filter:94 family=2 entries=34 op=nft_register_chain pid=3515 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:40:32.227000 audit[3515]: SYSCALL arch=c000003e syscall=46 success=yes exit=18196 a0=3 a1=7ffd26570480 a2=0 a3=7ffd2657046c items=0 ppid=2660 pid=3515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:32.227000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:40:32.366323 env[1202]: time="2025-05-15T10:40:32.365798065Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:40:32.366323 env[1202]: time="2025-05-15T10:40:32.365923165Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:40:32.366323 env[1202]: time="2025-05-15T10:40:32.365932904Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:40:32.366323 env[1202]: time="2025-05-15T10:40:32.366179366Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3ada8f1105570dbaf2864a88dc56c993efd333717eb305f93705efdbd9640264 pid=3523 runtime=io.containerd.runc.v2 May 15 10:40:32.386481 systemd[1]: Started cri-containerd-3ada8f1105570dbaf2864a88dc56c993efd333717eb305f93705efdbd9640264.scope. May 15 10:40:32.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.395000 audit: BPF prog-id=142 op=LOAD May 15 10:40:32.395000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.395000 audit[3534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3523 pid=3534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:32.395000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361646138663131303535373064626166323836346138386463353663 May 15 10:40:32.395000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.395000 audit[3534]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3523 pid=3534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:32.395000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361646138663131303535373064626166323836346138386463353663 May 15 10:40:32.395000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.395000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.395000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.395000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.395000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.395000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.395000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.395000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.395000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.395000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.395000 audit: BPF prog-id=143 op=LOAD May 15 10:40:32.395000 audit[3534]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002e5ff0 items=0 ppid=3523 pid=3534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:32.395000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361646138663131303535373064626166323836346138386463353663 May 15 10:40:32.395000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.395000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.395000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.395000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.395000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.395000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.395000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.395000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.395000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.395000 audit: BPF prog-id=144 op=LOAD May 15 10:40:32.395000 audit[3534]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003e6038 items=0 ppid=3523 pid=3534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:32.395000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361646138663131303535373064626166323836346138386463353663 May 15 10:40:32.395000 audit: BPF prog-id=144 op=UNLOAD May 15 10:40:32.395000 audit: BPF prog-id=143 op=UNLOAD May 15 10:40:32.395000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.395000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.395000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.395000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.395000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.395000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.395000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.395000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.395000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.395000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.395000 audit: BPF prog-id=145 op=LOAD May 15 10:40:32.395000 audit[3534]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003e6448 items=0 ppid=3523 pid=3534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:32.395000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361646138663131303535373064626166323836346138386463353663 May 15 10:40:32.397237 systemd-resolved[1140]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:40:32.418907 env[1202]: time="2025-05-15T10:40:32.418867703Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:fc1a1ab1-2d19-4816-98db-7709adf2d398,Namespace:default,Attempt:0,} returns sandbox id \"3ada8f1105570dbaf2864a88dc56c993efd333717eb305f93705efdbd9640264\"" May 15 10:40:32.420660 env[1202]: time="2025-05-15T10:40:32.420623601Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 15 10:40:32.896509 env[1202]: time="2025-05-15T10:40:32.896456272Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:32.898249 env[1202]: time="2025-05-15T10:40:32.898197602Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:32.900039 env[1202]: time="2025-05-15T10:40:32.900006802Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:32.901780 env[1202]: time="2025-05-15T10:40:32.901730559Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:32.902304 env[1202]: time="2025-05-15T10:40:32.902252370Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa\"" May 15 10:40:32.904490 env[1202]: time="2025-05-15T10:40:32.904459013Z" level=info msg="CreateContainer within sandbox \"3ada8f1105570dbaf2864a88dc56c993efd333717eb305f93705efdbd9640264\" for container &ContainerMetadata{Name:test,Attempt:0,}" May 15 10:40:32.920970 env[1202]: time="2025-05-15T10:40:32.920914117Z" level=info msg="CreateContainer within sandbox \"3ada8f1105570dbaf2864a88dc56c993efd333717eb305f93705efdbd9640264\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"e814d96486b97fefeb8b3d4e5be16d00a56ca707c9eee70ca73853f9ee359f2c\"" May 15 10:40:32.921594 env[1202]: time="2025-05-15T10:40:32.921552341Z" level=info msg="StartContainer for \"e814d96486b97fefeb8b3d4e5be16d00a56ca707c9eee70ca73853f9ee359f2c\"" May 15 10:40:32.936018 systemd[1]: Started cri-containerd-e814d96486b97fefeb8b3d4e5be16d00a56ca707c9eee70ca73853f9ee359f2c.scope. May 15 10:40:32.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.952000 audit: BPF prog-id=146 op=LOAD May 15 10:40:32.952000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.952000 audit[3566]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3523 pid=3566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:32.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538313464393634383662393766656665623862336434653562653136 May 15 10:40:32.952000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.952000 audit[3566]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3523 pid=3566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:32.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538313464393634383662393766656665623862336434653562653136 May 15 10:40:32.952000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.952000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.952000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.952000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.952000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.952000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.952000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.952000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.952000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.952000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.952000 audit: BPF prog-id=147 op=LOAD May 15 10:40:32.952000 audit[3566]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00030e580 items=0 ppid=3523 pid=3566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:32.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538313464393634383662393766656665623862336434653562653136 May 15 10:40:32.952000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.952000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.952000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.952000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.952000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.952000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.952000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.952000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.952000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.952000 audit: BPF prog-id=148 op=LOAD May 15 10:40:32.952000 audit[3566]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00030e5c8 items=0 ppid=3523 pid=3566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:32.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538313464393634383662393766656665623862336434653562653136 May 15 10:40:32.952000 audit: BPF prog-id=148 op=UNLOAD May 15 10:40:32.952000 audit: BPF prog-id=147 op=UNLOAD May 15 10:40:32.952000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.952000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.952000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.952000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.952000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.952000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.952000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.952000 audit[3566]: AVC avc: denied { perfmon } for pid=3566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.952000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.952000 audit[3566]: AVC avc: denied { bpf } for pid=3566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:32.952000 audit: BPF prog-id=149 op=LOAD May 15 10:40:32.952000 audit[3566]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00030e9d8 items=0 ppid=3523 pid=3566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:32.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538313464393634383662393766656665623862336434653562653136 May 15 10:40:32.967319 env[1202]: time="2025-05-15T10:40:32.967264766Z" level=info msg="StartContainer for \"e814d96486b97fefeb8b3d4e5be16d00a56ca707c9eee70ca73853f9ee359f2c\" returns successfully" May 15 10:40:33.077241 kubelet[1451]: E0515 10:40:33.077200 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:40:33.378860 kubelet[1451]: I0515 10:40:33.378796 1451 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=16.895886118 podStartE2EDuration="17.378780494s" podCreationTimestamp="2025-05-15 10:40:16 +0000 UTC" firstStartedPulling="2025-05-15 10:40:32.420264632 +0000 UTC m=+102.483498116" lastFinishedPulling="2025-05-15 10:40:32.903159008 +0000 UTC m=+102.966392492" observedRunningTime="2025-05-15 10:40:33.378478987 +0000 UTC m=+103.441712471" watchObservedRunningTime="2025-05-15 10:40:33.378780494 +0000 UTC m=+103.442013968" May 15 10:40:33.933049 systemd-networkd[1020]: cali5ec59c6bf6e: Gained IPv6LL May 15 10:40:34.077871 kubelet[1451]: E0515 10:40:34.077835 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:40:35.078438 kubelet[1451]: E0515 10:40:35.078341 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:40:36.078915 kubelet[1451]: E0515 10:40:36.078869 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:40:37.079449 kubelet[1451]: E0515 10:40:37.079377 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:40:38.079563 kubelet[1451]: E0515 10:40:38.079505 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"