May 15 10:42:46.673666 kernel: Linux version 5.15.182-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu May 15 09:06:41 -00 2025 May 15 10:42:46.673683 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=f8c1bc5ff10765e781843bfc97fc5357002a3f8a120201a0e954fce1d2ba48f0 May 15 10:42:46.673690 kernel: Disabled fast string operations May 15 10:42:46.673694 kernel: BIOS-provided physical RAM map: May 15 10:42:46.673698 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ebff] usable May 15 10:42:46.673702 kernel: BIOS-e820: [mem 0x000000000009ec00-0x000000000009ffff] reserved May 15 10:42:46.673708 kernel: BIOS-e820: [mem 0x00000000000dc000-0x00000000000fffff] reserved May 15 10:42:46.673712 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007fedffff] usable May 15 10:42:46.673716 kernel: BIOS-e820: [mem 0x000000007fee0000-0x000000007fefefff] ACPI data May 15 10:42:46.673720 kernel: BIOS-e820: [mem 0x000000007feff000-0x000000007fefffff] ACPI NVS May 15 10:42:46.673724 kernel: BIOS-e820: [mem 0x000000007ff00000-0x000000007fffffff] usable May 15 10:42:46.673728 kernel: BIOS-e820: [mem 0x00000000f0000000-0x00000000f7ffffff] reserved May 15 10:42:46.673732 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec0ffff] reserved May 15 10:42:46.673737 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved May 15 10:42:46.673743 kernel: BIOS-e820: [mem 0x00000000fffe0000-0x00000000ffffffff] reserved May 15 10:42:46.673748 kernel: NX (Execute Disable) protection: active May 15 10:42:46.673753 kernel: SMBIOS 2.7 present. May 15 10:42:46.673757 kernel: DMI: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 05/28/2020 May 15 10:42:46.673762 kernel: vmware: hypercall mode: 0x00 May 15 10:42:46.673766 kernel: Hypervisor detected: VMware May 15 10:42:46.673772 kernel: vmware: TSC freq read from hypervisor : 3408.000 MHz May 15 10:42:46.673776 kernel: vmware: Host bus clock speed read from hypervisor : 66000000 Hz May 15 10:42:46.673781 kernel: vmware: using clock offset of 4837714625 ns May 15 10:42:46.673785 kernel: tsc: Detected 3408.000 MHz processor May 15 10:42:46.673790 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 15 10:42:46.673795 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 15 10:42:46.673800 kernel: last_pfn = 0x80000 max_arch_pfn = 0x400000000 May 15 10:42:46.673805 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 15 10:42:46.673809 kernel: total RAM covered: 3072M May 15 10:42:46.673815 kernel: Found optimal setting for mtrr clean up May 15 10:42:46.673820 kernel: gran_size: 64K chunk_size: 64K num_reg: 2 lose cover RAM: 0G May 15 10:42:46.673825 kernel: Using GB pages for direct mapping May 15 10:42:46.673830 kernel: ACPI: Early table checksum verification disabled May 15 10:42:46.673834 kernel: ACPI: RSDP 0x00000000000F6A00 000024 (v02 PTLTD ) May 15 10:42:46.673839 kernel: ACPI: XSDT 0x000000007FEE965B 00005C (v01 INTEL 440BX 06040000 VMW 01324272) May 15 10:42:46.673844 kernel: ACPI: FACP 0x000000007FEFEE73 0000F4 (v04 INTEL 440BX 06040000 PTL 000F4240) May 15 10:42:46.673849 kernel: ACPI: DSDT 0x000000007FEEAD55 01411E (v01 PTLTD Custom 06040000 MSFT 03000001) May 15 10:42:46.673853 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 May 15 10:42:46.673858 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 May 15 10:42:46.673863 kernel: ACPI: BOOT 0x000000007FEEAD2D 000028 (v01 PTLTD $SBFTBL$ 06040000 LTP 00000001) May 15 10:42:46.673870 kernel: ACPI: APIC 0x000000007FEEA5EB 000742 (v01 PTLTD ? APIC 06040000 LTP 00000000) May 15 10:42:46.673875 kernel: ACPI: MCFG 0x000000007FEEA5AF 00003C (v01 PTLTD $PCITBL$ 06040000 LTP 00000001) May 15 10:42:46.673880 kernel: ACPI: SRAT 0x000000007FEE9757 0008A8 (v02 VMWARE MEMPLUG 06040000 VMW 00000001) May 15 10:42:46.673885 kernel: ACPI: HPET 0x000000007FEE971F 000038 (v01 VMWARE VMW HPET 06040000 VMW 00000001) May 15 10:42:46.673891 kernel: ACPI: WAET 0x000000007FEE96F7 000028 (v01 VMWARE VMW WAET 06040000 VMW 00000001) May 15 10:42:46.673896 kernel: ACPI: Reserving FACP table memory at [mem 0x7fefee73-0x7fefef66] May 15 10:42:46.673901 kernel: ACPI: Reserving DSDT table memory at [mem 0x7feead55-0x7fefee72] May 15 10:42:46.673906 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] May 15 10:42:46.673911 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] May 15 10:42:46.673916 kernel: ACPI: Reserving BOOT table memory at [mem 0x7feead2d-0x7feead54] May 15 10:42:46.673921 kernel: ACPI: Reserving APIC table memory at [mem 0x7feea5eb-0x7feead2c] May 15 10:42:46.673926 kernel: ACPI: Reserving MCFG table memory at [mem 0x7feea5af-0x7feea5ea] May 15 10:42:46.673931 kernel: ACPI: Reserving SRAT table memory at [mem 0x7fee9757-0x7fee9ffe] May 15 10:42:46.673937 kernel: ACPI: Reserving HPET table memory at [mem 0x7fee971f-0x7fee9756] May 15 10:42:46.673942 kernel: ACPI: Reserving WAET table memory at [mem 0x7fee96f7-0x7fee971e] May 15 10:42:46.673947 kernel: system APIC only can use physical flat May 15 10:42:46.673952 kernel: Setting APIC routing to physical flat. May 15 10:42:46.673957 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 May 15 10:42:46.673962 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 May 15 10:42:46.673968 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 May 15 10:42:46.673973 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 May 15 10:42:46.673977 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 May 15 10:42:46.673984 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 May 15 10:42:46.673989 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 May 15 10:42:46.673994 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 May 15 10:42:46.673999 kernel: SRAT: PXM 0 -> APIC 0x10 -> Node 0 May 15 10:42:46.674003 kernel: SRAT: PXM 0 -> APIC 0x12 -> Node 0 May 15 10:42:46.674008 kernel: SRAT: PXM 0 -> APIC 0x14 -> Node 0 May 15 10:42:46.674013 kernel: SRAT: PXM 0 -> APIC 0x16 -> Node 0 May 15 10:42:46.674018 kernel: SRAT: PXM 0 -> APIC 0x18 -> Node 0 May 15 10:42:46.674023 kernel: SRAT: PXM 0 -> APIC 0x1a -> Node 0 May 15 10:42:46.674028 kernel: SRAT: PXM 0 -> APIC 0x1c -> Node 0 May 15 10:42:46.674033 kernel: SRAT: PXM 0 -> APIC 0x1e -> Node 0 May 15 10:42:46.674038 kernel: SRAT: PXM 0 -> APIC 0x20 -> Node 0 May 15 10:42:46.674043 kernel: SRAT: PXM 0 -> APIC 0x22 -> Node 0 May 15 10:42:46.674048 kernel: SRAT: PXM 0 -> APIC 0x24 -> Node 0 May 15 10:42:46.674053 kernel: SRAT: PXM 0 -> APIC 0x26 -> Node 0 May 15 10:42:46.674058 kernel: SRAT: PXM 0 -> APIC 0x28 -> Node 0 May 15 10:42:46.674063 kernel: SRAT: PXM 0 -> APIC 0x2a -> Node 0 May 15 10:42:46.674068 kernel: SRAT: PXM 0 -> APIC 0x2c -> Node 0 May 15 10:42:46.674073 kernel: SRAT: PXM 0 -> APIC 0x2e -> Node 0 May 15 10:42:46.674078 kernel: SRAT: PXM 0 -> APIC 0x30 -> Node 0 May 15 10:42:46.674084 kernel: SRAT: PXM 0 -> APIC 0x32 -> Node 0 May 15 10:42:46.674089 kernel: SRAT: PXM 0 -> APIC 0x34 -> Node 0 May 15 10:42:46.674094 kernel: SRAT: PXM 0 -> APIC 0x36 -> Node 0 May 15 10:42:46.674099 kernel: SRAT: PXM 0 -> APIC 0x38 -> Node 0 May 15 10:42:46.674104 kernel: SRAT: PXM 0 -> APIC 0x3a -> Node 0 May 15 10:42:46.674108 kernel: SRAT: PXM 0 -> APIC 0x3c -> Node 0 May 15 10:42:46.674113 kernel: SRAT: PXM 0 -> APIC 0x3e -> Node 0 May 15 10:42:46.674118 kernel: SRAT: PXM 0 -> APIC 0x40 -> Node 0 May 15 10:42:46.674123 kernel: SRAT: PXM 0 -> APIC 0x42 -> Node 0 May 15 10:42:46.674128 kernel: SRAT: PXM 0 -> APIC 0x44 -> Node 0 May 15 10:42:46.674134 kernel: SRAT: PXM 0 -> APIC 0x46 -> Node 0 May 15 10:42:46.674139 kernel: SRAT: PXM 0 -> APIC 0x48 -> Node 0 May 15 10:42:46.674144 kernel: SRAT: PXM 0 -> APIC 0x4a -> Node 0 May 15 10:42:46.674149 kernel: SRAT: PXM 0 -> APIC 0x4c -> Node 0 May 15 10:42:46.674154 kernel: SRAT: PXM 0 -> APIC 0x4e -> Node 0 May 15 10:42:46.674159 kernel: SRAT: PXM 0 -> APIC 0x50 -> Node 0 May 15 10:42:46.674164 kernel: SRAT: PXM 0 -> APIC 0x52 -> Node 0 May 15 10:42:46.674169 kernel: SRAT: PXM 0 -> APIC 0x54 -> Node 0 May 15 10:42:46.674174 kernel: SRAT: PXM 0 -> APIC 0x56 -> Node 0 May 15 10:42:46.674179 kernel: SRAT: PXM 0 -> APIC 0x58 -> Node 0 May 15 10:42:46.674185 kernel: SRAT: PXM 0 -> APIC 0x5a -> Node 0 May 15 10:42:46.674190 kernel: SRAT: PXM 0 -> APIC 0x5c -> Node 0 May 15 10:42:46.674195 kernel: SRAT: PXM 0 -> APIC 0x5e -> Node 0 May 15 10:42:46.674207 kernel: SRAT: PXM 0 -> APIC 0x60 -> Node 0 May 15 10:42:46.674212 kernel: SRAT: PXM 0 -> APIC 0x62 -> Node 0 May 15 10:42:46.674216 kernel: SRAT: PXM 0 -> APIC 0x64 -> Node 0 May 15 10:42:46.674221 kernel: SRAT: PXM 0 -> APIC 0x66 -> Node 0 May 15 10:42:46.674227 kernel: SRAT: PXM 0 -> APIC 0x68 -> Node 0 May 15 10:42:46.674238 kernel: SRAT: PXM 0 -> APIC 0x6a -> Node 0 May 15 10:42:46.674243 kernel: SRAT: PXM 0 -> APIC 0x6c -> Node 0 May 15 10:42:46.674250 kernel: SRAT: PXM 0 -> APIC 0x6e -> Node 0 May 15 10:42:46.674255 kernel: SRAT: PXM 0 -> APIC 0x70 -> Node 0 May 15 10:42:46.674260 kernel: SRAT: PXM 0 -> APIC 0x72 -> Node 0 May 15 10:42:46.674265 kernel: SRAT: PXM 0 -> APIC 0x74 -> Node 0 May 15 10:42:46.674270 kernel: SRAT: PXM 0 -> APIC 0x76 -> Node 0 May 15 10:42:46.674275 kernel: SRAT: PXM 0 -> APIC 0x78 -> Node 0 May 15 10:42:46.674284 kernel: SRAT: PXM 0 -> APIC 0x7a -> Node 0 May 15 10:42:46.674290 kernel: SRAT: PXM 0 -> APIC 0x7c -> Node 0 May 15 10:42:46.674295 kernel: SRAT: PXM 0 -> APIC 0x7e -> Node 0 May 15 10:42:46.674300 kernel: SRAT: PXM 0 -> APIC 0x80 -> Node 0 May 15 10:42:46.674306 kernel: SRAT: PXM 0 -> APIC 0x82 -> Node 0 May 15 10:42:46.674312 kernel: SRAT: PXM 0 -> APIC 0x84 -> Node 0 May 15 10:42:46.674317 kernel: SRAT: PXM 0 -> APIC 0x86 -> Node 0 May 15 10:42:46.674322 kernel: SRAT: PXM 0 -> APIC 0x88 -> Node 0 May 15 10:42:46.674328 kernel: SRAT: PXM 0 -> APIC 0x8a -> Node 0 May 15 10:42:46.674333 kernel: SRAT: PXM 0 -> APIC 0x8c -> Node 0 May 15 10:42:46.674338 kernel: SRAT: PXM 0 -> APIC 0x8e -> Node 0 May 15 10:42:46.674343 kernel: SRAT: PXM 0 -> APIC 0x90 -> Node 0 May 15 10:42:46.674350 kernel: SRAT: PXM 0 -> APIC 0x92 -> Node 0 May 15 10:42:46.674355 kernel: SRAT: PXM 0 -> APIC 0x94 -> Node 0 May 15 10:42:46.674360 kernel: SRAT: PXM 0 -> APIC 0x96 -> Node 0 May 15 10:42:46.674365 kernel: SRAT: PXM 0 -> APIC 0x98 -> Node 0 May 15 10:42:46.674371 kernel: SRAT: PXM 0 -> APIC 0x9a -> Node 0 May 15 10:42:46.674376 kernel: SRAT: PXM 0 -> APIC 0x9c -> Node 0 May 15 10:42:46.674381 kernel: SRAT: PXM 0 -> APIC 0x9e -> Node 0 May 15 10:42:46.674386 kernel: SRAT: PXM 0 -> APIC 0xa0 -> Node 0 May 15 10:42:46.674392 kernel: SRAT: PXM 0 -> APIC 0xa2 -> Node 0 May 15 10:42:46.674397 kernel: SRAT: PXM 0 -> APIC 0xa4 -> Node 0 May 15 10:42:46.674404 kernel: SRAT: PXM 0 -> APIC 0xa6 -> Node 0 May 15 10:42:46.674410 kernel: SRAT: PXM 0 -> APIC 0xa8 -> Node 0 May 15 10:42:46.674415 kernel: SRAT: PXM 0 -> APIC 0xaa -> Node 0 May 15 10:42:46.674420 kernel: SRAT: PXM 0 -> APIC 0xac -> Node 0 May 15 10:42:46.674425 kernel: SRAT: PXM 0 -> APIC 0xae -> Node 0 May 15 10:42:46.674431 kernel: SRAT: PXM 0 -> APIC 0xb0 -> Node 0 May 15 10:42:46.674436 kernel: SRAT: PXM 0 -> APIC 0xb2 -> Node 0 May 15 10:42:46.674441 kernel: SRAT: PXM 0 -> APIC 0xb4 -> Node 0 May 15 10:42:46.674447 kernel: SRAT: PXM 0 -> APIC 0xb6 -> Node 0 May 15 10:42:46.674453 kernel: SRAT: PXM 0 -> APIC 0xb8 -> Node 0 May 15 10:42:46.674458 kernel: SRAT: PXM 0 -> APIC 0xba -> Node 0 May 15 10:42:46.674463 kernel: SRAT: PXM 0 -> APIC 0xbc -> Node 0 May 15 10:42:46.674468 kernel: SRAT: PXM 0 -> APIC 0xbe -> Node 0 May 15 10:42:46.674474 kernel: SRAT: PXM 0 -> APIC 0xc0 -> Node 0 May 15 10:42:46.674479 kernel: SRAT: PXM 0 -> APIC 0xc2 -> Node 0 May 15 10:42:46.674484 kernel: SRAT: PXM 0 -> APIC 0xc4 -> Node 0 May 15 10:42:46.674490 kernel: SRAT: PXM 0 -> APIC 0xc6 -> Node 0 May 15 10:42:46.674495 kernel: SRAT: PXM 0 -> APIC 0xc8 -> Node 0 May 15 10:42:46.674501 kernel: SRAT: PXM 0 -> APIC 0xca -> Node 0 May 15 10:42:46.674507 kernel: SRAT: PXM 0 -> APIC 0xcc -> Node 0 May 15 10:42:46.674512 kernel: SRAT: PXM 0 -> APIC 0xce -> Node 0 May 15 10:42:46.674517 kernel: SRAT: PXM 0 -> APIC 0xd0 -> Node 0 May 15 10:42:46.674523 kernel: SRAT: PXM 0 -> APIC 0xd2 -> Node 0 May 15 10:42:46.674528 kernel: SRAT: PXM 0 -> APIC 0xd4 -> Node 0 May 15 10:42:46.674533 kernel: SRAT: PXM 0 -> APIC 0xd6 -> Node 0 May 15 10:42:46.674539 kernel: SRAT: PXM 0 -> APIC 0xd8 -> Node 0 May 15 10:42:46.674544 kernel: SRAT: PXM 0 -> APIC 0xda -> Node 0 May 15 10:42:46.674549 kernel: SRAT: PXM 0 -> APIC 0xdc -> Node 0 May 15 10:42:46.674554 kernel: SRAT: PXM 0 -> APIC 0xde -> Node 0 May 15 10:42:46.674560 kernel: SRAT: PXM 0 -> APIC 0xe0 -> Node 0 May 15 10:42:46.674566 kernel: SRAT: PXM 0 -> APIC 0xe2 -> Node 0 May 15 10:42:46.674571 kernel: SRAT: PXM 0 -> APIC 0xe4 -> Node 0 May 15 10:42:46.674576 kernel: SRAT: PXM 0 -> APIC 0xe6 -> Node 0 May 15 10:42:46.674582 kernel: SRAT: PXM 0 -> APIC 0xe8 -> Node 0 May 15 10:42:46.674587 kernel: SRAT: PXM 0 -> APIC 0xea -> Node 0 May 15 10:42:46.674592 kernel: SRAT: PXM 0 -> APIC 0xec -> Node 0 May 15 10:42:46.674598 kernel: SRAT: PXM 0 -> APIC 0xee -> Node 0 May 15 10:42:46.674603 kernel: SRAT: PXM 0 -> APIC 0xf0 -> Node 0 May 15 10:42:46.674608 kernel: SRAT: PXM 0 -> APIC 0xf2 -> Node 0 May 15 10:42:46.674614 kernel: SRAT: PXM 0 -> APIC 0xf4 -> Node 0 May 15 10:42:46.674619 kernel: SRAT: PXM 0 -> APIC 0xf6 -> Node 0 May 15 10:42:46.674625 kernel: SRAT: PXM 0 -> APIC 0xf8 -> Node 0 May 15 10:42:46.674630 kernel: SRAT: PXM 0 -> APIC 0xfa -> Node 0 May 15 10:42:46.674636 kernel: SRAT: PXM 0 -> APIC 0xfc -> Node 0 May 15 10:42:46.674641 kernel: SRAT: PXM 0 -> APIC 0xfe -> Node 0 May 15 10:42:46.674646 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] May 15 10:42:46.674652 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] May 15 10:42:46.674657 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000-0xbfffffff] hotplug May 15 10:42:46.674663 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7fffffff] -> [mem 0x00000000-0x7fffffff] May 15 10:42:46.674669 kernel: NODE_DATA(0) allocated [mem 0x7fffa000-0x7fffffff] May 15 10:42:46.674675 kernel: Zone ranges: May 15 10:42:46.674680 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 15 10:42:46.674686 kernel: DMA32 [mem 0x0000000001000000-0x000000007fffffff] May 15 10:42:46.674691 kernel: Normal empty May 15 10:42:46.674697 kernel: Movable zone start for each node May 15 10:42:46.674702 kernel: Early memory node ranges May 15 10:42:46.674708 kernel: node 0: [mem 0x0000000000001000-0x000000000009dfff] May 15 10:42:46.674713 kernel: node 0: [mem 0x0000000000100000-0x000000007fedffff] May 15 10:42:46.674719 kernel: node 0: [mem 0x000000007ff00000-0x000000007fffffff] May 15 10:42:46.674725 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007fffffff] May 15 10:42:46.674731 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 15 10:42:46.674736 kernel: On node 0, zone DMA: 98 pages in unavailable ranges May 15 10:42:46.674741 kernel: On node 0, zone DMA32: 32 pages in unavailable ranges May 15 10:42:46.674747 kernel: ACPI: PM-Timer IO Port: 0x1008 May 15 10:42:46.674752 kernel: system APIC only can use physical flat May 15 10:42:46.674757 kernel: ACPI: LAPIC_NMI (acpi_id[0x00] high edge lint[0x1]) May 15 10:42:46.674763 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) May 15 10:42:46.674768 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) May 15 10:42:46.674774 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) May 15 10:42:46.674780 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) May 15 10:42:46.674785 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) May 15 10:42:46.674790 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) May 15 10:42:46.674796 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) May 15 10:42:46.674801 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) May 15 10:42:46.674806 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) May 15 10:42:46.674812 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) May 15 10:42:46.674817 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) May 15 10:42:46.674823 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) May 15 10:42:46.674829 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) May 15 10:42:46.674834 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) May 15 10:42:46.674839 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) May 15 10:42:46.674844 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) May 15 10:42:46.674850 kernel: ACPI: LAPIC_NMI (acpi_id[0x11] high edge lint[0x1]) May 15 10:42:46.674855 kernel: ACPI: LAPIC_NMI (acpi_id[0x12] high edge lint[0x1]) May 15 10:42:46.674860 kernel: ACPI: LAPIC_NMI (acpi_id[0x13] high edge lint[0x1]) May 15 10:42:46.674865 kernel: ACPI: LAPIC_NMI (acpi_id[0x14] high edge lint[0x1]) May 15 10:42:46.674872 kernel: ACPI: LAPIC_NMI (acpi_id[0x15] high edge lint[0x1]) May 15 10:42:46.674877 kernel: ACPI: LAPIC_NMI (acpi_id[0x16] high edge lint[0x1]) May 15 10:42:46.674882 kernel: ACPI: LAPIC_NMI (acpi_id[0x17] high edge lint[0x1]) May 15 10:42:46.674888 kernel: ACPI: LAPIC_NMI (acpi_id[0x18] high edge lint[0x1]) May 15 10:42:46.674893 kernel: ACPI: LAPIC_NMI (acpi_id[0x19] high edge lint[0x1]) May 15 10:42:46.674898 kernel: ACPI: LAPIC_NMI (acpi_id[0x1a] high edge lint[0x1]) May 15 10:42:46.674904 kernel: ACPI: LAPIC_NMI (acpi_id[0x1b] high edge lint[0x1]) May 15 10:42:46.674909 kernel: ACPI: LAPIC_NMI (acpi_id[0x1c] high edge lint[0x1]) May 15 10:42:46.674914 kernel: ACPI: LAPIC_NMI (acpi_id[0x1d] high edge lint[0x1]) May 15 10:42:46.674919 kernel: ACPI: LAPIC_NMI (acpi_id[0x1e] high edge lint[0x1]) May 15 10:42:46.674926 kernel: ACPI: LAPIC_NMI (acpi_id[0x1f] high edge lint[0x1]) May 15 10:42:46.674931 kernel: ACPI: LAPIC_NMI (acpi_id[0x20] high edge lint[0x1]) May 15 10:42:46.674937 kernel: ACPI: LAPIC_NMI (acpi_id[0x21] high edge lint[0x1]) May 15 10:42:46.674942 kernel: ACPI: LAPIC_NMI (acpi_id[0x22] high edge lint[0x1]) May 15 10:42:46.674947 kernel: ACPI: LAPIC_NMI (acpi_id[0x23] high edge lint[0x1]) May 15 10:42:46.674953 kernel: ACPI: LAPIC_NMI (acpi_id[0x24] high edge lint[0x1]) May 15 10:42:46.674958 kernel: ACPI: LAPIC_NMI (acpi_id[0x25] high edge lint[0x1]) May 15 10:42:46.674963 kernel: ACPI: LAPIC_NMI (acpi_id[0x26] high edge lint[0x1]) May 15 10:42:46.674969 kernel: ACPI: LAPIC_NMI (acpi_id[0x27] high edge lint[0x1]) May 15 10:42:46.674975 kernel: ACPI: LAPIC_NMI (acpi_id[0x28] high edge lint[0x1]) May 15 10:42:46.674981 kernel: ACPI: LAPIC_NMI (acpi_id[0x29] high edge lint[0x1]) May 15 10:42:46.674986 kernel: ACPI: LAPIC_NMI (acpi_id[0x2a] high edge lint[0x1]) May 15 10:42:46.674992 kernel: ACPI: LAPIC_NMI (acpi_id[0x2b] high edge lint[0x1]) May 15 10:42:46.674997 kernel: ACPI: LAPIC_NMI (acpi_id[0x2c] high edge lint[0x1]) May 15 10:42:46.675003 kernel: ACPI: LAPIC_NMI (acpi_id[0x2d] high edge lint[0x1]) May 15 10:42:46.675008 kernel: ACPI: LAPIC_NMI (acpi_id[0x2e] high edge lint[0x1]) May 15 10:42:46.675013 kernel: ACPI: LAPIC_NMI (acpi_id[0x2f] high edge lint[0x1]) May 15 10:42:46.675019 kernel: ACPI: LAPIC_NMI (acpi_id[0x30] high edge lint[0x1]) May 15 10:42:46.675024 kernel: ACPI: LAPIC_NMI (acpi_id[0x31] high edge lint[0x1]) May 15 10:42:46.675030 kernel: ACPI: LAPIC_NMI (acpi_id[0x32] high edge lint[0x1]) May 15 10:42:46.675035 kernel: ACPI: LAPIC_NMI (acpi_id[0x33] high edge lint[0x1]) May 15 10:42:46.675041 kernel: ACPI: LAPIC_NMI (acpi_id[0x34] high edge lint[0x1]) May 15 10:42:46.675046 kernel: ACPI: LAPIC_NMI (acpi_id[0x35] high edge lint[0x1]) May 15 10:42:46.675052 kernel: ACPI: LAPIC_NMI (acpi_id[0x36] high edge lint[0x1]) May 15 10:42:46.675057 kernel: ACPI: LAPIC_NMI (acpi_id[0x37] high edge lint[0x1]) May 15 10:42:46.675063 kernel: ACPI: LAPIC_NMI (acpi_id[0x38] high edge lint[0x1]) May 15 10:42:46.675068 kernel: ACPI: LAPIC_NMI (acpi_id[0x39] high edge lint[0x1]) May 15 10:42:46.675073 kernel: ACPI: LAPIC_NMI (acpi_id[0x3a] high edge lint[0x1]) May 15 10:42:46.675080 kernel: ACPI: LAPIC_NMI (acpi_id[0x3b] high edge lint[0x1]) May 15 10:42:46.675085 kernel: ACPI: LAPIC_NMI (acpi_id[0x3c] high edge lint[0x1]) May 15 10:42:46.675090 kernel: ACPI: LAPIC_NMI (acpi_id[0x3d] high edge lint[0x1]) May 15 10:42:46.675096 kernel: ACPI: LAPIC_NMI (acpi_id[0x3e] high edge lint[0x1]) May 15 10:42:46.675101 kernel: ACPI: LAPIC_NMI (acpi_id[0x3f] high edge lint[0x1]) May 15 10:42:46.675106 kernel: ACPI: LAPIC_NMI (acpi_id[0x40] high edge lint[0x1]) May 15 10:42:46.675112 kernel: ACPI: LAPIC_NMI (acpi_id[0x41] high edge lint[0x1]) May 15 10:42:46.675117 kernel: ACPI: LAPIC_NMI (acpi_id[0x42] high edge lint[0x1]) May 15 10:42:46.675122 kernel: ACPI: LAPIC_NMI (acpi_id[0x43] high edge lint[0x1]) May 15 10:42:46.675128 kernel: ACPI: LAPIC_NMI (acpi_id[0x44] high edge lint[0x1]) May 15 10:42:46.675134 kernel: ACPI: LAPIC_NMI (acpi_id[0x45] high edge lint[0x1]) May 15 10:42:46.675140 kernel: ACPI: LAPIC_NMI (acpi_id[0x46] high edge lint[0x1]) May 15 10:42:46.675145 kernel: ACPI: LAPIC_NMI (acpi_id[0x47] high edge lint[0x1]) May 15 10:42:46.675150 kernel: ACPI: LAPIC_NMI (acpi_id[0x48] high edge lint[0x1]) May 15 10:42:46.675156 kernel: ACPI: LAPIC_NMI (acpi_id[0x49] high edge lint[0x1]) May 15 10:42:46.675161 kernel: ACPI: LAPIC_NMI (acpi_id[0x4a] high edge lint[0x1]) May 15 10:42:46.675166 kernel: ACPI: LAPIC_NMI (acpi_id[0x4b] high edge lint[0x1]) May 15 10:42:46.675172 kernel: ACPI: LAPIC_NMI (acpi_id[0x4c] high edge lint[0x1]) May 15 10:42:46.675177 kernel: ACPI: LAPIC_NMI (acpi_id[0x4d] high edge lint[0x1]) May 15 10:42:46.675183 kernel: ACPI: LAPIC_NMI (acpi_id[0x4e] high edge lint[0x1]) May 15 10:42:46.675189 kernel: ACPI: LAPIC_NMI (acpi_id[0x4f] high edge lint[0x1]) May 15 10:42:46.675194 kernel: ACPI: LAPIC_NMI (acpi_id[0x50] high edge lint[0x1]) May 15 10:42:46.675206 kernel: ACPI: LAPIC_NMI (acpi_id[0x51] high edge lint[0x1]) May 15 10:42:46.675212 kernel: ACPI: LAPIC_NMI (acpi_id[0x52] high edge lint[0x1]) May 15 10:42:46.675217 kernel: ACPI: LAPIC_NMI (acpi_id[0x53] high edge lint[0x1]) May 15 10:42:46.675223 kernel: ACPI: LAPIC_NMI (acpi_id[0x54] high edge lint[0x1]) May 15 10:42:46.675228 kernel: ACPI: LAPIC_NMI (acpi_id[0x55] high edge lint[0x1]) May 15 10:42:46.675234 kernel: ACPI: LAPIC_NMI (acpi_id[0x56] high edge lint[0x1]) May 15 10:42:46.675239 kernel: ACPI: LAPIC_NMI (acpi_id[0x57] high edge lint[0x1]) May 15 10:42:46.675246 kernel: ACPI: LAPIC_NMI (acpi_id[0x58] high edge lint[0x1]) May 15 10:42:46.675252 kernel: ACPI: LAPIC_NMI (acpi_id[0x59] high edge lint[0x1]) May 15 10:42:46.675257 kernel: ACPI: LAPIC_NMI (acpi_id[0x5a] high edge lint[0x1]) May 15 10:42:46.675262 kernel: ACPI: LAPIC_NMI (acpi_id[0x5b] high edge lint[0x1]) May 15 10:42:46.675268 kernel: ACPI: LAPIC_NMI (acpi_id[0x5c] high edge lint[0x1]) May 15 10:42:46.675273 kernel: ACPI: LAPIC_NMI (acpi_id[0x5d] high edge lint[0x1]) May 15 10:42:46.675278 kernel: ACPI: LAPIC_NMI (acpi_id[0x5e] high edge lint[0x1]) May 15 10:42:46.675284 kernel: ACPI: LAPIC_NMI (acpi_id[0x5f] high edge lint[0x1]) May 15 10:42:46.675290 kernel: ACPI: LAPIC_NMI (acpi_id[0x60] high edge lint[0x1]) May 15 10:42:46.675296 kernel: ACPI: LAPIC_NMI (acpi_id[0x61] high edge lint[0x1]) May 15 10:42:46.675302 kernel: ACPI: LAPIC_NMI (acpi_id[0x62] high edge lint[0x1]) May 15 10:42:46.675307 kernel: ACPI: LAPIC_NMI (acpi_id[0x63] high edge lint[0x1]) May 15 10:42:46.675312 kernel: ACPI: LAPIC_NMI (acpi_id[0x64] high edge lint[0x1]) May 15 10:42:46.675318 kernel: ACPI: LAPIC_NMI (acpi_id[0x65] high edge lint[0x1]) May 15 10:42:46.675323 kernel: ACPI: LAPIC_NMI (acpi_id[0x66] high edge lint[0x1]) May 15 10:42:46.675328 kernel: ACPI: LAPIC_NMI (acpi_id[0x67] high edge lint[0x1]) May 15 10:42:46.675333 kernel: ACPI: LAPIC_NMI (acpi_id[0x68] high edge lint[0x1]) May 15 10:42:46.675339 kernel: ACPI: LAPIC_NMI (acpi_id[0x69] high edge lint[0x1]) May 15 10:42:46.675344 kernel: ACPI: LAPIC_NMI (acpi_id[0x6a] high edge lint[0x1]) May 15 10:42:46.675350 kernel: ACPI: LAPIC_NMI (acpi_id[0x6b] high edge lint[0x1]) May 15 10:42:46.675356 kernel: ACPI: LAPIC_NMI (acpi_id[0x6c] high edge lint[0x1]) May 15 10:42:46.675361 kernel: ACPI: LAPIC_NMI (acpi_id[0x6d] high edge lint[0x1]) May 15 10:42:46.675366 kernel: ACPI: LAPIC_NMI (acpi_id[0x6e] high edge lint[0x1]) May 15 10:42:46.675372 kernel: ACPI: LAPIC_NMI (acpi_id[0x6f] high edge lint[0x1]) May 15 10:42:46.675377 kernel: ACPI: LAPIC_NMI (acpi_id[0x70] high edge lint[0x1]) May 15 10:42:46.675383 kernel: ACPI: LAPIC_NMI (acpi_id[0x71] high edge lint[0x1]) May 15 10:42:46.675388 kernel: ACPI: LAPIC_NMI (acpi_id[0x72] high edge lint[0x1]) May 15 10:42:46.675393 kernel: ACPI: LAPIC_NMI (acpi_id[0x73] high edge lint[0x1]) May 15 10:42:46.675400 kernel: ACPI: LAPIC_NMI (acpi_id[0x74] high edge lint[0x1]) May 15 10:42:46.675405 kernel: ACPI: LAPIC_NMI (acpi_id[0x75] high edge lint[0x1]) May 15 10:42:46.675411 kernel: ACPI: LAPIC_NMI (acpi_id[0x76] high edge lint[0x1]) May 15 10:42:46.675416 kernel: ACPI: LAPIC_NMI (acpi_id[0x77] high edge lint[0x1]) May 15 10:42:46.675421 kernel: ACPI: LAPIC_NMI (acpi_id[0x78] high edge lint[0x1]) May 15 10:42:46.675427 kernel: ACPI: LAPIC_NMI (acpi_id[0x79] high edge lint[0x1]) May 15 10:42:46.675432 kernel: ACPI: LAPIC_NMI (acpi_id[0x7a] high edge lint[0x1]) May 15 10:42:46.675437 kernel: ACPI: LAPIC_NMI (acpi_id[0x7b] high edge lint[0x1]) May 15 10:42:46.675443 kernel: ACPI: LAPIC_NMI (acpi_id[0x7c] high edge lint[0x1]) May 15 10:42:46.675449 kernel: ACPI: LAPIC_NMI (acpi_id[0x7d] high edge lint[0x1]) May 15 10:42:46.675454 kernel: ACPI: LAPIC_NMI (acpi_id[0x7e] high edge lint[0x1]) May 15 10:42:46.675460 kernel: ACPI: LAPIC_NMI (acpi_id[0x7f] high edge lint[0x1]) May 15 10:42:46.675465 kernel: IOAPIC[0]: apic_id 1, version 17, address 0xfec00000, GSI 0-23 May 15 10:42:46.675470 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 high edge) May 15 10:42:46.675476 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 15 10:42:46.675481 kernel: ACPI: HPET id: 0x8086af01 base: 0xfed00000 May 15 10:42:46.675486 kernel: TSC deadline timer available May 15 10:42:46.675492 kernel: smpboot: Allowing 128 CPUs, 126 hotplug CPUs May 15 10:42:46.675497 kernel: [mem 0x80000000-0xefffffff] available for PCI devices May 15 10:42:46.675504 kernel: Booting paravirtualized kernel on VMware hypervisor May 15 10:42:46.675510 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 15 10:42:46.675516 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:128 nr_node_ids:1 May 15 10:42:46.675522 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 May 15 10:42:46.675527 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 May 15 10:42:46.675532 kernel: pcpu-alloc: [0] 000 001 002 003 004 005 006 007 May 15 10:42:46.675537 kernel: pcpu-alloc: [0] 008 009 010 011 012 013 014 015 May 15 10:42:46.675542 kernel: pcpu-alloc: [0] 016 017 018 019 020 021 022 023 May 15 10:42:46.675548 kernel: pcpu-alloc: [0] 024 025 026 027 028 029 030 031 May 15 10:42:46.675554 kernel: pcpu-alloc: [0] 032 033 034 035 036 037 038 039 May 15 10:42:46.675559 kernel: pcpu-alloc: [0] 040 041 042 043 044 045 046 047 May 15 10:42:46.675565 kernel: pcpu-alloc: [0] 048 049 050 051 052 053 054 055 May 15 10:42:46.675577 kernel: pcpu-alloc: [0] 056 057 058 059 060 061 062 063 May 15 10:42:46.675584 kernel: pcpu-alloc: [0] 064 065 066 067 068 069 070 071 May 15 10:42:46.675590 kernel: pcpu-alloc: [0] 072 073 074 075 076 077 078 079 May 15 10:42:46.675596 kernel: pcpu-alloc: [0] 080 081 082 083 084 085 086 087 May 15 10:42:46.675602 kernel: pcpu-alloc: [0] 088 089 090 091 092 093 094 095 May 15 10:42:46.675609 kernel: pcpu-alloc: [0] 096 097 098 099 100 101 102 103 May 15 10:42:46.675614 kernel: pcpu-alloc: [0] 104 105 106 107 108 109 110 111 May 15 10:42:46.675620 kernel: pcpu-alloc: [0] 112 113 114 115 116 117 118 119 May 15 10:42:46.675626 kernel: pcpu-alloc: [0] 120 121 122 123 124 125 126 127 May 15 10:42:46.675631 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515808 May 15 10:42:46.675637 kernel: Policy zone: DMA32 May 15 10:42:46.675644 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=f8c1bc5ff10765e781843bfc97fc5357002a3f8a120201a0e954fce1d2ba48f0 May 15 10:42:46.675650 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 15 10:42:46.675657 kernel: printk: log_buf_len individual max cpu contribution: 4096 bytes May 15 10:42:46.675663 kernel: printk: log_buf_len total cpu_extra contributions: 520192 bytes May 15 10:42:46.675668 kernel: printk: log_buf_len min size: 262144 bytes May 15 10:42:46.675679 kernel: printk: log_buf_len: 1048576 bytes May 15 10:42:46.675685 kernel: printk: early log buf free: 239728(91%) May 15 10:42:46.675691 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 15 10:42:46.675696 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) May 15 10:42:46.675702 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 15 10:42:46.675708 kernel: Memory: 1940392K/2096628K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47472K init, 4108K bss, 155976K reserved, 0K cma-reserved) May 15 10:42:46.675715 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=128, Nodes=1 May 15 10:42:46.675721 kernel: ftrace: allocating 34585 entries in 136 pages May 15 10:42:46.675727 kernel: ftrace: allocated 136 pages with 2 groups May 15 10:42:46.675734 kernel: rcu: Hierarchical RCU implementation. May 15 10:42:46.675740 kernel: rcu: RCU event tracing is enabled. May 15 10:42:46.675746 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=128. May 15 10:42:46.675753 kernel: Rude variant of Tasks RCU enabled. May 15 10:42:46.675759 kernel: Tracing variant of Tasks RCU enabled. May 15 10:42:46.675765 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 15 10:42:46.675771 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=128 May 15 10:42:46.675777 kernel: NR_IRQS: 33024, nr_irqs: 1448, preallocated irqs: 16 May 15 10:42:46.675783 kernel: random: crng init done May 15 10:42:46.675788 kernel: Console: colour VGA+ 80x25 May 15 10:42:46.675794 kernel: printk: console [tty0] enabled May 15 10:42:46.675800 kernel: printk: console [ttyS0] enabled May 15 10:42:46.675807 kernel: ACPI: Core revision 20210730 May 15 10:42:46.675813 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 133484882848 ns May 15 10:42:46.675818 kernel: APIC: Switch to symmetric I/O mode setup May 15 10:42:46.675824 kernel: x2apic enabled May 15 10:42:46.675830 kernel: Switched APIC routing to physical x2apic. May 15 10:42:46.675836 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 15 10:42:46.675842 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns May 15 10:42:46.675847 kernel: Calibrating delay loop (skipped) preset value.. 6816.00 BogoMIPS (lpj=3408000) May 15 10:42:46.675853 kernel: Disabled fast string operations May 15 10:42:46.675860 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 May 15 10:42:46.675866 kernel: Last level dTLB entries: 4KB 64, 2MB 32, 4MB 32, 1GB 4 May 15 10:42:46.675872 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 15 10:42:46.675878 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! May 15 10:42:46.675884 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit May 15 10:42:46.675890 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall May 15 10:42:46.675896 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS May 15 10:42:46.675902 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT May 15 10:42:46.675908 kernel: RETBleed: Mitigation: Enhanced IBRS May 15 10:42:46.675914 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier May 15 10:42:46.675920 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp May 15 10:42:46.675926 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode May 15 10:42:46.675932 kernel: SRBDS: Unknown: Dependent on hypervisor status May 15 10:42:46.675938 kernel: GDS: Unknown: Dependent on hypervisor status May 15 10:42:46.675944 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 15 10:42:46.675949 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 15 10:42:46.675955 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 15 10:42:46.675962 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 15 10:42:46.675968 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. May 15 10:42:46.675974 kernel: Freeing SMP alternatives memory: 32K May 15 10:42:46.675979 kernel: pid_max: default: 131072 minimum: 1024 May 15 10:42:46.675985 kernel: LSM: Security Framework initializing May 15 10:42:46.675991 kernel: SELinux: Initializing. May 15 10:42:46.675997 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) May 15 10:42:46.676002 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) May 15 10:42:46.676008 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) May 15 10:42:46.676015 kernel: Performance Events: Skylake events, core PMU driver. May 15 10:42:46.676021 kernel: core: CPUID marked event: 'cpu cycles' unavailable May 15 10:42:46.676027 kernel: core: CPUID marked event: 'instructions' unavailable May 15 10:42:46.676033 kernel: core: CPUID marked event: 'bus cycles' unavailable May 15 10:42:46.676039 kernel: core: CPUID marked event: 'cache references' unavailable May 15 10:42:46.676045 kernel: core: CPUID marked event: 'cache misses' unavailable May 15 10:42:46.676050 kernel: core: CPUID marked event: 'branch instructions' unavailable May 15 10:42:46.676056 kernel: core: CPUID marked event: 'branch misses' unavailable May 15 10:42:46.676061 kernel: ... version: 1 May 15 10:42:46.676068 kernel: ... bit width: 48 May 15 10:42:46.676074 kernel: ... generic registers: 4 May 15 10:42:46.676080 kernel: ... value mask: 0000ffffffffffff May 15 10:42:46.676085 kernel: ... max period: 000000007fffffff May 15 10:42:46.676091 kernel: ... fixed-purpose events: 0 May 15 10:42:46.676097 kernel: ... event mask: 000000000000000f May 15 10:42:46.676103 kernel: signal: max sigframe size: 1776 May 15 10:42:46.676109 kernel: rcu: Hierarchical SRCU implementation. May 15 10:42:46.676115 kernel: NMI watchdog: Perf NMI watchdog permanently disabled May 15 10:42:46.676122 kernel: smp: Bringing up secondary CPUs ... May 15 10:42:46.676128 kernel: x86: Booting SMP configuration: May 15 10:42:46.676133 kernel: .... node #0, CPUs: #1 May 15 10:42:46.676139 kernel: Disabled fast string operations May 15 10:42:46.676145 kernel: smpboot: CPU 1 Converting physical 2 to logical package 1 May 15 10:42:46.676150 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 May 15 10:42:46.676157 kernel: smp: Brought up 1 node, 2 CPUs May 15 10:42:46.676163 kernel: smpboot: Max logical packages: 128 May 15 10:42:46.676169 kernel: smpboot: Total of 2 processors activated (13632.00 BogoMIPS) May 15 10:42:46.676174 kernel: devtmpfs: initialized May 15 10:42:46.676181 kernel: x86/mm: Memory block size: 128MB May 15 10:42:46.676187 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x7feff000-0x7fefffff] (4096 bytes) May 15 10:42:46.676193 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 15 10:42:46.679715 kernel: futex hash table entries: 32768 (order: 9, 2097152 bytes, linear) May 15 10:42:46.679733 kernel: pinctrl core: initialized pinctrl subsystem May 15 10:42:46.679739 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 15 10:42:46.679746 kernel: audit: initializing netlink subsys (disabled) May 15 10:42:46.679752 kernel: audit: type=2000 audit(1747305764.059:1): state=initialized audit_enabled=0 res=1 May 15 10:42:46.679758 kernel: thermal_sys: Registered thermal governor 'step_wise' May 15 10:42:46.679767 kernel: thermal_sys: Registered thermal governor 'user_space' May 15 10:42:46.679773 kernel: cpuidle: using governor menu May 15 10:42:46.679778 kernel: Simple Boot Flag at 0x36 set to 0x80 May 15 10:42:46.679784 kernel: ACPI: bus type PCI registered May 15 10:42:46.679790 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 15 10:42:46.679796 kernel: dca service started, version 1.12.1 May 15 10:42:46.679802 kernel: PCI: MMCONFIG for domain 0000 [bus 00-7f] at [mem 0xf0000000-0xf7ffffff] (base 0xf0000000) May 15 10:42:46.679808 kernel: PCI: MMCONFIG at [mem 0xf0000000-0xf7ffffff] reserved in E820 May 15 10:42:46.679814 kernel: PCI: Using configuration type 1 for base access May 15 10:42:46.679821 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 15 10:42:46.679827 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 15 10:42:46.679833 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 15 10:42:46.679839 kernel: ACPI: Added _OSI(Module Device) May 15 10:42:46.679844 kernel: ACPI: Added _OSI(Processor Device) May 15 10:42:46.679850 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 15 10:42:46.679856 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 15 10:42:46.679862 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 15 10:42:46.679867 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 15 10:42:46.679874 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 15 10:42:46.679880 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 15 10:42:46.679886 kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored May 15 10:42:46.679892 kernel: ACPI: Interpreter enabled May 15 10:42:46.679898 kernel: ACPI: PM: (supports S0 S1 S5) May 15 10:42:46.679904 kernel: ACPI: Using IOAPIC for interrupt routing May 15 10:42:46.679910 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 15 10:42:46.679916 kernel: ACPI: Enabled 4 GPEs in block 00 to 0F May 15 10:42:46.679922 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-7f]) May 15 10:42:46.680013 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 15 10:42:46.680064 kernel: acpi PNP0A03:00: _OSC: platform does not support [AER LTR] May 15 10:42:46.680110 kernel: acpi PNP0A03:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability] May 15 10:42:46.680118 kernel: PCI host bridge to bus 0000:00 May 15 10:42:46.680166 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 15 10:42:46.680221 kernel: pci_bus 0000:00: root bus resource [mem 0x000cc000-0x000dbfff window] May 15 10:42:46.680267 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] May 15 10:42:46.680311 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 15 10:42:46.680352 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xfeff window] May 15 10:42:46.680392 kernel: pci_bus 0000:00: root bus resource [bus 00-7f] May 15 10:42:46.680447 kernel: pci 0000:00:00.0: [8086:7190] type 00 class 0x060000 May 15 10:42:46.680500 kernel: pci 0000:00:01.0: [8086:7191] type 01 class 0x060400 May 15 10:42:46.680554 kernel: pci 0000:00:07.0: [8086:7110] type 00 class 0x060100 May 15 10:42:46.680608 kernel: pci 0000:00:07.1: [8086:7111] type 00 class 0x01018a May 15 10:42:46.680655 kernel: pci 0000:00:07.1: reg 0x20: [io 0x1060-0x106f] May 15 10:42:46.680708 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] May 15 10:42:46.680755 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x14: [io 0x03f6] May 15 10:42:46.680802 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] May 15 10:42:46.680849 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x1c: [io 0x0376] May 15 10:42:46.681052 kernel: pci 0000:00:07.3: [8086:7113] type 00 class 0x068000 May 15 10:42:46.681108 kernel: pci 0000:00:07.3: quirk: [io 0x1000-0x103f] claimed by PIIX4 ACPI May 15 10:42:46.681160 kernel: pci 0000:00:07.3: quirk: [io 0x1040-0x104f] claimed by PIIX4 SMB May 15 10:42:46.681220 kernel: pci 0000:00:07.7: [15ad:0740] type 00 class 0x088000 May 15 10:42:46.681273 kernel: pci 0000:00:07.7: reg 0x10: [io 0x1080-0x10bf] May 15 10:42:46.681324 kernel: pci 0000:00:07.7: reg 0x14: [mem 0xfebfe000-0xfebfffff 64bit] May 15 10:42:46.681380 kernel: pci 0000:00:0f.0: [15ad:0405] type 00 class 0x030000 May 15 10:42:46.681431 kernel: pci 0000:00:0f.0: reg 0x10: [io 0x1070-0x107f] May 15 10:42:46.681481 kernel: pci 0000:00:0f.0: reg 0x14: [mem 0xe8000000-0xefffffff pref] May 15 10:42:46.681530 kernel: pci 0000:00:0f.0: reg 0x18: [mem 0xfe000000-0xfe7fffff] May 15 10:42:46.681579 kernel: pci 0000:00:0f.0: reg 0x30: [mem 0x00000000-0x00007fff pref] May 15 10:42:46.681628 kernel: pci 0000:00:0f.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 15 10:42:46.681682 kernel: pci 0000:00:11.0: [15ad:0790] type 01 class 0x060401 May 15 10:42:46.681739 kernel: pci 0000:00:15.0: [15ad:07a0] type 01 class 0x060400 May 15 10:42:46.681791 kernel: pci 0000:00:15.0: PME# supported from D0 D3hot D3cold May 15 10:42:46.681845 kernel: pci 0000:00:15.1: [15ad:07a0] type 01 class 0x060400 May 15 10:42:46.681899 kernel: pci 0000:00:15.1: PME# supported from D0 D3hot D3cold May 15 10:42:46.681955 kernel: pci 0000:00:15.2: [15ad:07a0] type 01 class 0x060400 May 15 10:42:46.682006 kernel: pci 0000:00:15.2: PME# supported from D0 D3hot D3cold May 15 10:42:46.682060 kernel: pci 0000:00:15.3: [15ad:07a0] type 01 class 0x060400 May 15 10:42:46.682113 kernel: pci 0000:00:15.3: PME# supported from D0 D3hot D3cold May 15 10:42:46.682167 kernel: pci 0000:00:15.4: [15ad:07a0] type 01 class 0x060400 May 15 10:42:46.682224 kernel: pci 0000:00:15.4: PME# supported from D0 D3hot D3cold May 15 10:42:46.682278 kernel: pci 0000:00:15.5: [15ad:07a0] type 01 class 0x060400 May 15 10:42:46.682329 kernel: pci 0000:00:15.5: PME# supported from D0 D3hot D3cold May 15 10:42:46.682383 kernel: pci 0000:00:15.6: [15ad:07a0] type 01 class 0x060400 May 15 10:42:46.682452 kernel: pci 0000:00:15.6: PME# supported from D0 D3hot D3cold May 15 10:42:46.682527 kernel: pci 0000:00:15.7: [15ad:07a0] type 01 class 0x060400 May 15 10:42:46.682580 kernel: pci 0000:00:15.7: PME# supported from D0 D3hot D3cold May 15 10:42:46.682636 kernel: pci 0000:00:16.0: [15ad:07a0] type 01 class 0x060400 May 15 10:42:46.682687 kernel: pci 0000:00:16.0: PME# supported from D0 D3hot D3cold May 15 10:42:46.682743 kernel: pci 0000:00:16.1: [15ad:07a0] type 01 class 0x060400 May 15 10:42:46.682793 kernel: pci 0000:00:16.1: PME# supported from D0 D3hot D3cold May 15 10:42:46.682848 kernel: pci 0000:00:16.2: [15ad:07a0] type 01 class 0x060400 May 15 10:42:46.682898 kernel: pci 0000:00:16.2: PME# supported from D0 D3hot D3cold May 15 10:42:46.682950 kernel: pci 0000:00:16.3: [15ad:07a0] type 01 class 0x060400 May 15 10:42:46.683000 kernel: pci 0000:00:16.3: PME# supported from D0 D3hot D3cold May 15 10:42:46.683056 kernel: pci 0000:00:16.4: [15ad:07a0] type 01 class 0x060400 May 15 10:42:46.683107 kernel: pci 0000:00:16.4: PME# supported from D0 D3hot D3cold May 15 10:42:46.683159 kernel: pci 0000:00:16.5: [15ad:07a0] type 01 class 0x060400 May 15 10:42:46.683217 kernel: pci 0000:00:16.5: PME# supported from D0 D3hot D3cold May 15 10:42:46.687557 kernel: pci 0000:00:16.6: [15ad:07a0] type 01 class 0x060400 May 15 10:42:46.687633 kernel: pci 0000:00:16.6: PME# supported from D0 D3hot D3cold May 15 10:42:46.687692 kernel: pci 0000:00:16.7: [15ad:07a0] type 01 class 0x060400 May 15 10:42:46.687741 kernel: pci 0000:00:16.7: PME# supported from D0 D3hot D3cold May 15 10:42:46.687791 kernel: pci 0000:00:17.0: [15ad:07a0] type 01 class 0x060400 May 15 10:42:46.687839 kernel: pci 0000:00:17.0: PME# supported from D0 D3hot D3cold May 15 10:42:46.687889 kernel: pci 0000:00:17.1: [15ad:07a0] type 01 class 0x060400 May 15 10:42:46.687935 kernel: pci 0000:00:17.1: PME# supported from D0 D3hot D3cold May 15 10:42:46.687985 kernel: pci 0000:00:17.2: [15ad:07a0] type 01 class 0x060400 May 15 10:42:46.688034 kernel: pci 0000:00:17.2: PME# supported from D0 D3hot D3cold May 15 10:42:46.688086 kernel: pci 0000:00:17.3: [15ad:07a0] type 01 class 0x060400 May 15 10:42:46.688133 kernel: pci 0000:00:17.3: PME# supported from D0 D3hot D3cold May 15 10:42:46.688183 kernel: pci 0000:00:17.4: [15ad:07a0] type 01 class 0x060400 May 15 10:42:46.688237 kernel: pci 0000:00:17.4: PME# supported from D0 D3hot D3cold May 15 10:42:46.688287 kernel: pci 0000:00:17.5: [15ad:07a0] type 01 class 0x060400 May 15 10:42:46.688336 kernel: pci 0000:00:17.5: PME# supported from D0 D3hot D3cold May 15 10:42:46.688385 kernel: pci 0000:00:17.6: [15ad:07a0] type 01 class 0x060400 May 15 10:42:46.688431 kernel: pci 0000:00:17.6: PME# supported from D0 D3hot D3cold May 15 10:42:46.691392 kernel: pci 0000:00:17.7: [15ad:07a0] type 01 class 0x060400 May 15 10:42:46.691452 kernel: pci 0000:00:17.7: PME# supported from D0 D3hot D3cold May 15 10:42:46.691506 kernel: pci 0000:00:18.0: [15ad:07a0] type 01 class 0x060400 May 15 10:42:46.691588 kernel: pci 0000:00:18.0: PME# supported from D0 D3hot D3cold May 15 10:42:46.691856 kernel: pci 0000:00:18.1: [15ad:07a0] type 01 class 0x060400 May 15 10:42:46.691908 kernel: pci 0000:00:18.1: PME# supported from D0 D3hot D3cold May 15 10:42:46.691963 kernel: pci 0000:00:18.2: [15ad:07a0] type 01 class 0x060400 May 15 10:42:46.694263 kernel: pci 0000:00:18.2: PME# supported from D0 D3hot D3cold May 15 10:42:46.694325 kernel: pci 0000:00:18.3: [15ad:07a0] type 01 class 0x060400 May 15 10:42:46.694379 kernel: pci 0000:00:18.3: PME# supported from D0 D3hot D3cold May 15 10:42:46.694431 kernel: pci 0000:00:18.4: [15ad:07a0] type 01 class 0x060400 May 15 10:42:46.694478 kernel: pci 0000:00:18.4: PME# supported from D0 D3hot D3cold May 15 10:42:46.694528 kernel: pci 0000:00:18.5: [15ad:07a0] type 01 class 0x060400 May 15 10:42:46.694575 kernel: pci 0000:00:18.5: PME# supported from D0 D3hot D3cold May 15 10:42:46.694625 kernel: pci 0000:00:18.6: [15ad:07a0] type 01 class 0x060400 May 15 10:42:46.694674 kernel: pci 0000:00:18.6: PME# supported from D0 D3hot D3cold May 15 10:42:46.694733 kernel: pci 0000:00:18.7: [15ad:07a0] type 01 class 0x060400 May 15 10:42:46.694780 kernel: pci 0000:00:18.7: PME# supported from D0 D3hot D3cold May 15 10:42:46.694830 kernel: pci_bus 0000:01: extended config space not accessible May 15 10:42:46.694879 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] May 15 10:42:46.694928 kernel: pci_bus 0000:02: extended config space not accessible May 15 10:42:46.694937 kernel: acpiphp: Slot [32] registered May 15 10:42:46.694946 kernel: acpiphp: Slot [33] registered May 15 10:42:46.694952 kernel: acpiphp: Slot [34] registered May 15 10:42:46.694957 kernel: acpiphp: Slot [35] registered May 15 10:42:46.694963 kernel: acpiphp: Slot [36] registered May 15 10:42:46.694969 kernel: acpiphp: Slot [37] registered May 15 10:42:46.694975 kernel: acpiphp: Slot [38] registered May 15 10:42:46.694981 kernel: acpiphp: Slot [39] registered May 15 10:42:46.694987 kernel: acpiphp: Slot [40] registered May 15 10:42:46.694992 kernel: acpiphp: Slot [41] registered May 15 10:42:46.694998 kernel: acpiphp: Slot [42] registered May 15 10:42:46.695005 kernel: acpiphp: Slot [43] registered May 15 10:42:46.695011 kernel: acpiphp: Slot [44] registered May 15 10:42:46.695017 kernel: acpiphp: Slot [45] registered May 15 10:42:46.695023 kernel: acpiphp: Slot [46] registered May 15 10:42:46.695029 kernel: acpiphp: Slot [47] registered May 15 10:42:46.695035 kernel: acpiphp: Slot [48] registered May 15 10:42:46.695040 kernel: acpiphp: Slot [49] registered May 15 10:42:46.695046 kernel: acpiphp: Slot [50] registered May 15 10:42:46.695052 kernel: acpiphp: Slot [51] registered May 15 10:42:46.695059 kernel: acpiphp: Slot [52] registered May 15 10:42:46.695065 kernel: acpiphp: Slot [53] registered May 15 10:42:46.695071 kernel: acpiphp: Slot [54] registered May 15 10:42:46.695077 kernel: acpiphp: Slot [55] registered May 15 10:42:46.695082 kernel: acpiphp: Slot [56] registered May 15 10:42:46.695088 kernel: acpiphp: Slot [57] registered May 15 10:42:46.695094 kernel: acpiphp: Slot [58] registered May 15 10:42:46.695100 kernel: acpiphp: Slot [59] registered May 15 10:42:46.695106 kernel: acpiphp: Slot [60] registered May 15 10:42:46.695112 kernel: acpiphp: Slot [61] registered May 15 10:42:46.695119 kernel: acpiphp: Slot [62] registered May 15 10:42:46.695124 kernel: acpiphp: Slot [63] registered May 15 10:42:46.699300 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] (subtractive decode) May 15 10:42:46.699367 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] May 15 10:42:46.699417 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] May 15 10:42:46.699464 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] May 15 10:42:46.699512 kernel: pci 0000:00:11.0: bridge window [mem 0x000a0000-0x000bffff window] (subtractive decode) May 15 10:42:46.699559 kernel: pci 0000:00:11.0: bridge window [mem 0x000cc000-0x000dbfff window] (subtractive decode) May 15 10:42:46.699608 kernel: pci 0000:00:11.0: bridge window [mem 0xc0000000-0xfebfffff window] (subtractive decode) May 15 10:42:46.699653 kernel: pci 0000:00:11.0: bridge window [io 0x0000-0x0cf7 window] (subtractive decode) May 15 10:42:46.699699 kernel: pci 0000:00:11.0: bridge window [io 0x0d00-0xfeff window] (subtractive decode) May 15 10:42:46.699754 kernel: pci 0000:03:00.0: [15ad:07c0] type 00 class 0x010700 May 15 10:42:46.699804 kernel: pci 0000:03:00.0: reg 0x10: [io 0x4000-0x4007] May 15 10:42:46.699852 kernel: pci 0000:03:00.0: reg 0x14: [mem 0xfd5f8000-0xfd5fffff 64bit] May 15 10:42:46.699900 kernel: pci 0000:03:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] May 15 10:42:46.699949 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold May 15 10:42:46.699996 kernel: pci 0000:03:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' May 15 10:42:46.700045 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] May 15 10:42:46.700092 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] May 15 10:42:46.700138 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] May 15 10:42:46.700185 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] May 15 10:42:46.700277 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] May 15 10:42:46.700329 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] May 15 10:42:46.700375 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] May 15 10:42:46.700423 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] May 15 10:42:46.700470 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] May 15 10:42:46.700516 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] May 15 10:42:46.700562 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] May 15 10:42:46.700610 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] May 15 10:42:46.700657 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] May 15 10:42:46.700717 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] May 15 10:42:46.700766 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] May 15 10:42:46.700811 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] May 15 10:42:46.700858 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] May 15 10:42:46.700909 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] May 15 10:42:46.700955 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] May 15 10:42:46.701000 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] May 15 10:42:46.701048 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] May 15 10:42:46.701095 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] May 15 10:42:46.701141 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] May 15 10:42:46.701188 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] May 15 10:42:46.701249 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] May 15 10:42:46.701297 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] May 15 10:42:46.701354 kernel: pci 0000:0b:00.0: [15ad:07b0] type 00 class 0x020000 May 15 10:42:46.701402 kernel: pci 0000:0b:00.0: reg 0x10: [mem 0xfd4fc000-0xfd4fcfff] May 15 10:42:46.701450 kernel: pci 0000:0b:00.0: reg 0x14: [mem 0xfd4fd000-0xfd4fdfff] May 15 10:42:46.701498 kernel: pci 0000:0b:00.0: reg 0x18: [mem 0xfd4fe000-0xfd4fffff] May 15 10:42:46.701545 kernel: pci 0000:0b:00.0: reg 0x1c: [io 0x5000-0x500f] May 15 10:42:46.701592 kernel: pci 0000:0b:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] May 15 10:42:46.701641 kernel: pci 0000:0b:00.0: supports D1 D2 May 15 10:42:46.701688 kernel: pci 0000:0b:00.0: PME# supported from D0 D1 D2 D3hot D3cold May 15 10:42:46.701735 kernel: pci 0000:0b:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' May 15 10:42:46.701782 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] May 15 10:42:46.701828 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] May 15 10:42:46.701873 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] May 15 10:42:46.701919 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] May 15 10:42:46.701965 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] May 15 10:42:46.702012 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] May 15 10:42:46.702058 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] May 15 10:42:46.702106 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] May 15 10:42:46.702152 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] May 15 10:42:46.702231 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] May 15 10:42:46.702285 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] May 15 10:42:46.702333 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] May 15 10:42:46.702379 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] May 15 10:42:46.702426 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] May 15 10:42:46.702472 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] May 15 10:42:46.702517 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] May 15 10:42:46.702561 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] May 15 10:42:46.702628 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] May 15 10:42:46.702677 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] May 15 10:42:46.702723 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] May 15 10:42:46.702770 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] May 15 10:42:46.702819 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] May 15 10:42:46.702864 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] May 15 10:42:46.702911 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] May 15 10:42:46.702957 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] May 15 10:42:46.703002 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] May 15 10:42:46.703050 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] May 15 10:42:46.703096 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] May 15 10:42:46.703142 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] May 15 10:42:46.703189 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] May 15 10:42:46.704288 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] May 15 10:42:46.704341 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] May 15 10:42:46.704389 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] May 15 10:42:46.704435 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] May 15 10:42:46.704483 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] May 15 10:42:46.704528 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] May 15 10:42:46.704577 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] May 15 10:42:46.704622 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] May 15 10:42:46.704670 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] May 15 10:42:46.704714 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] May 15 10:42:46.704759 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] May 15 10:42:46.704806 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] May 15 10:42:46.704851 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] May 15 10:42:46.704896 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] May 15 10:42:46.704945 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] May 15 10:42:46.704990 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] May 15 10:42:46.705035 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] May 15 10:42:46.705081 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] May 15 10:42:46.705127 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] May 15 10:42:46.705172 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] May 15 10:42:46.709192 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] May 15 10:42:46.709289 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] May 15 10:42:46.709342 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] May 15 10:42:46.709391 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] May 15 10:42:46.709437 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] May 15 10:42:46.709483 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] May 15 10:42:46.709528 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] May 15 10:42:46.709576 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] May 15 10:42:46.709622 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] May 15 10:42:46.709667 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] May 15 10:42:46.709720 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] May 15 10:42:46.709767 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] May 15 10:42:46.709812 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] May 15 10:42:46.709858 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] May 15 10:42:46.709906 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] May 15 10:42:46.709951 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] May 15 10:42:46.709996 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] May 15 10:42:46.710043 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] May 15 10:42:46.710090 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] May 15 10:42:46.710136 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] May 15 10:42:46.710183 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] May 15 10:42:46.710235 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] May 15 10:42:46.710281 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] May 15 10:42:46.710330 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] May 15 10:42:46.710375 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] May 15 10:42:46.710420 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] May 15 10:42:46.710469 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] May 15 10:42:46.710515 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] May 15 10:42:46.710561 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] May 15 10:42:46.710569 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 9 May 15 10:42:46.710575 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 0 May 15 10:42:46.710581 kernel: ACPI: PCI: Interrupt link LNKB disabled May 15 10:42:46.710587 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 15 10:42:46.710593 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 10 May 15 10:42:46.710600 kernel: iommu: Default domain type: Translated May 15 10:42:46.710606 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 15 10:42:46.710652 kernel: pci 0000:00:0f.0: vgaarb: setting as boot VGA device May 15 10:42:46.710711 kernel: pci 0000:00:0f.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 15 10:42:46.710757 kernel: pci 0000:00:0f.0: vgaarb: bridge control possible May 15 10:42:46.710766 kernel: vgaarb: loaded May 15 10:42:46.710772 kernel: pps_core: LinuxPPS API ver. 1 registered May 15 10:42:46.710778 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 15 10:42:46.710784 kernel: PTP clock support registered May 15 10:42:46.710791 kernel: PCI: Using ACPI for IRQ routing May 15 10:42:46.710797 kernel: PCI: pci_cache_line_size set to 64 bytes May 15 10:42:46.710803 kernel: e820: reserve RAM buffer [mem 0x0009ec00-0x0009ffff] May 15 10:42:46.710809 kernel: e820: reserve RAM buffer [mem 0x7fee0000-0x7fffffff] May 15 10:42:46.710815 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 May 15 10:42:46.710821 kernel: hpet0: 16 comparators, 64-bit 14.318180 MHz counter May 15 10:42:46.710827 kernel: clocksource: Switched to clocksource tsc-early May 15 10:42:46.710832 kernel: VFS: Disk quotas dquot_6.6.0 May 15 10:42:46.710839 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 15 10:42:46.710846 kernel: pnp: PnP ACPI init May 15 10:42:46.710894 kernel: system 00:00: [io 0x1000-0x103f] has been reserved May 15 10:42:46.710938 kernel: system 00:00: [io 0x1040-0x104f] has been reserved May 15 10:42:46.710979 kernel: system 00:00: [io 0x0cf0-0x0cf1] has been reserved May 15 10:42:46.711025 kernel: system 00:04: [mem 0xfed00000-0xfed003ff] has been reserved May 15 10:42:46.711069 kernel: pnp 00:06: [dma 2] May 15 10:42:46.711114 kernel: system 00:07: [io 0xfce0-0xfcff] has been reserved May 15 10:42:46.711159 kernel: system 00:07: [mem 0xf0000000-0xf7ffffff] has been reserved May 15 10:42:46.711215 kernel: system 00:07: [mem 0xfe800000-0xfe9fffff] has been reserved May 15 10:42:46.711225 kernel: pnp: PnP ACPI: found 8 devices May 15 10:42:46.711232 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 15 10:42:46.711238 kernel: NET: Registered PF_INET protocol family May 15 10:42:46.711244 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) May 15 10:42:46.711250 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) May 15 10:42:46.711256 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 15 10:42:46.711264 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) May 15 10:42:46.711270 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) May 15 10:42:46.711276 kernel: TCP: Hash tables configured (established 16384 bind 16384) May 15 10:42:46.711282 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) May 15 10:42:46.711288 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) May 15 10:42:46.711294 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 15 10:42:46.711300 kernel: NET: Registered PF_XDP protocol family May 15 10:42:46.711352 kernel: pci 0000:00:15.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 May 15 10:42:46.711403 kernel: pci 0000:00:15.3: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 May 15 10:42:46.711453 kernel: pci 0000:00:15.4: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 May 15 10:42:46.711501 kernel: pci 0000:00:15.5: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 May 15 10:42:46.711549 kernel: pci 0000:00:15.6: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 May 15 10:42:46.711596 kernel: pci 0000:00:15.7: bridge window [io 0x1000-0x0fff] to [bus 0a] add_size 1000 May 15 10:42:46.711644 kernel: pci 0000:00:16.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 0b] add_size 200000 add_align 100000 May 15 10:42:46.711693 kernel: pci 0000:00:16.3: bridge window [io 0x1000-0x0fff] to [bus 0e] add_size 1000 May 15 10:42:46.711741 kernel: pci 0000:00:16.4: bridge window [io 0x1000-0x0fff] to [bus 0f] add_size 1000 May 15 10:42:46.711789 kernel: pci 0000:00:16.5: bridge window [io 0x1000-0x0fff] to [bus 10] add_size 1000 May 15 10:42:46.711836 kernel: pci 0000:00:16.6: bridge window [io 0x1000-0x0fff] to [bus 11] add_size 1000 May 15 10:42:46.711883 kernel: pci 0000:00:16.7: bridge window [io 0x1000-0x0fff] to [bus 12] add_size 1000 May 15 10:42:46.711930 kernel: pci 0000:00:17.3: bridge window [io 0x1000-0x0fff] to [bus 16] add_size 1000 May 15 10:42:46.711979 kernel: pci 0000:00:17.4: bridge window [io 0x1000-0x0fff] to [bus 17] add_size 1000 May 15 10:42:46.712026 kernel: pci 0000:00:17.5: bridge window [io 0x1000-0x0fff] to [bus 18] add_size 1000 May 15 10:42:46.712073 kernel: pci 0000:00:17.6: bridge window [io 0x1000-0x0fff] to [bus 19] add_size 1000 May 15 10:42:46.712119 kernel: pci 0000:00:17.7: bridge window [io 0x1000-0x0fff] to [bus 1a] add_size 1000 May 15 10:42:46.712165 kernel: pci 0000:00:18.2: bridge window [io 0x1000-0x0fff] to [bus 1d] add_size 1000 May 15 10:42:46.712222 kernel: pci 0000:00:18.3: bridge window [io 0x1000-0x0fff] to [bus 1e] add_size 1000 May 15 10:42:46.712273 kernel: pci 0000:00:18.4: bridge window [io 0x1000-0x0fff] to [bus 1f] add_size 1000 May 15 10:42:46.712319 kernel: pci 0000:00:18.5: bridge window [io 0x1000-0x0fff] to [bus 20] add_size 1000 May 15 10:42:46.712365 kernel: pci 0000:00:18.6: bridge window [io 0x1000-0x0fff] to [bus 21] add_size 1000 May 15 10:42:46.712410 kernel: pci 0000:00:18.7: bridge window [io 0x1000-0x0fff] to [bus 22] add_size 1000 May 15 10:42:46.712456 kernel: pci 0000:00:15.0: BAR 15: assigned [mem 0xc0000000-0xc01fffff 64bit pref] May 15 10:42:46.712503 kernel: pci 0000:00:16.0: BAR 15: assigned [mem 0xc0200000-0xc03fffff 64bit pref] May 15 10:42:46.712551 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] May 15 10:42:46.712596 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] May 15 10:42:46.712643 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] May 15 10:42:46.712689 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] May 15 10:42:46.712735 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] May 15 10:42:46.712780 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] May 15 10:42:46.712826 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] May 15 10:42:46.712872 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] May 15 10:42:46.712919 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] May 15 10:42:46.712965 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] May 15 10:42:46.713011 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] May 15 10:42:46.713056 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] May 15 10:42:46.713104 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] May 15 10:42:46.713150 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] May 15 10:42:46.713196 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] May 15 10:42:46.715339 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] May 15 10:42:46.715395 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] May 15 10:42:46.715444 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] May 15 10:42:46.715492 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] May 15 10:42:46.715538 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] May 15 10:42:46.715585 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] May 15 10:42:46.715630 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] May 15 10:42:46.715676 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] May 15 10:42:46.715721 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] May 15 10:42:46.715770 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] May 15 10:42:46.715814 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] May 15 10:42:46.715861 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] May 15 10:42:46.715906 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] May 15 10:42:46.715953 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] May 15 10:42:46.715997 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] May 15 10:42:46.716043 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] May 15 10:42:46.716088 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] May 15 10:42:46.716137 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] May 15 10:42:46.716183 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] May 15 10:42:46.718303 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] May 15 10:42:46.718360 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] May 15 10:42:46.718409 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] May 15 10:42:46.718456 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] May 15 10:42:46.718504 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] May 15 10:42:46.718549 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] May 15 10:42:46.718599 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] May 15 10:42:46.718645 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] May 15 10:42:46.718691 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] May 15 10:42:46.718737 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] May 15 10:42:46.718783 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] May 15 10:42:46.718828 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] May 15 10:42:46.718873 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] May 15 10:42:46.718918 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] May 15 10:42:46.718964 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] May 15 10:42:46.719012 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] May 15 10:42:46.719058 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] May 15 10:42:46.719104 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] May 15 10:42:46.719151 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] May 15 10:42:46.719204 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] May 15 10:42:46.719258 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] May 15 10:42:46.719305 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] May 15 10:42:46.719352 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] May 15 10:42:46.719397 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] May 15 10:42:46.719446 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] May 15 10:42:46.719492 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] May 15 10:42:46.719538 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] May 15 10:42:46.719584 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] May 15 10:42:46.719631 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] May 15 10:42:46.719677 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] May 15 10:42:46.719724 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] May 15 10:42:46.719770 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] May 15 10:42:46.719817 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] May 15 10:42:46.719863 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] May 15 10:42:46.719913 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] May 15 10:42:46.719959 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] May 15 10:42:46.720006 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] May 15 10:42:46.720053 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] May 15 10:42:46.720100 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] May 15 10:42:46.720146 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] May 15 10:42:46.720193 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] May 15 10:42:46.721296 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] May 15 10:42:46.721349 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] May 15 10:42:46.721401 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] May 15 10:42:46.721449 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] May 15 10:42:46.721496 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] May 15 10:42:46.721543 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] May 15 10:42:46.721589 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] May 15 10:42:46.721635 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] May 15 10:42:46.721680 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] May 15 10:42:46.721727 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] May 15 10:42:46.721775 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] May 15 10:42:46.721820 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] May 15 10:42:46.721866 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] May 15 10:42:46.721912 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] May 15 10:42:46.721962 kernel: pci 0000:03:00.0: BAR 6: assigned [mem 0xfd500000-0xfd50ffff pref] May 15 10:42:46.722011 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] May 15 10:42:46.722056 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] May 15 10:42:46.722102 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] May 15 10:42:46.722147 kernel: pci 0000:00:15.0: bridge window [mem 0xc0000000-0xc01fffff 64bit pref] May 15 10:42:46.722194 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] May 15 10:42:46.723338 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] May 15 10:42:46.723390 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] May 15 10:42:46.723438 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] May 15 10:42:46.723490 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] May 15 10:42:46.723536 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] May 15 10:42:46.723582 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] May 15 10:42:46.723627 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] May 15 10:42:46.723677 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] May 15 10:42:46.723724 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] May 15 10:42:46.723773 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] May 15 10:42:46.723819 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] May 15 10:42:46.723865 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] May 15 10:42:46.723911 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] May 15 10:42:46.723959 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] May 15 10:42:46.724003 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] May 15 10:42:46.724051 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] May 15 10:42:46.724098 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] May 15 10:42:46.724144 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] May 15 10:42:46.724190 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] May 15 10:42:46.725310 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] May 15 10:42:46.725364 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] May 15 10:42:46.725413 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] May 15 10:42:46.725464 kernel: pci 0000:0b:00.0: BAR 6: assigned [mem 0xfd400000-0xfd40ffff pref] May 15 10:42:46.725512 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] May 15 10:42:46.725563 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] May 15 10:42:46.725608 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] May 15 10:42:46.725654 kernel: pci 0000:00:16.0: bridge window [mem 0xc0200000-0xc03fffff 64bit pref] May 15 10:42:46.725702 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] May 15 10:42:46.725749 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] May 15 10:42:46.725794 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] May 15 10:42:46.725841 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] May 15 10:42:46.725887 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] May 15 10:42:46.725933 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] May 15 10:42:46.725978 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] May 15 10:42:46.726026 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] May 15 10:42:46.726074 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] May 15 10:42:46.726119 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] May 15 10:42:46.726166 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] May 15 10:42:46.727099 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] May 15 10:42:46.727155 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] May 15 10:42:46.727239 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] May 15 10:42:46.727291 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] May 15 10:42:46.727337 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] May 15 10:42:46.727386 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] May 15 10:42:46.727434 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] May 15 10:42:46.727479 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] May 15 10:42:46.727524 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] May 15 10:42:46.727571 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] May 15 10:42:46.727616 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] May 15 10:42:46.727662 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] May 15 10:42:46.727709 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] May 15 10:42:46.727755 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] May 15 10:42:46.727800 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] May 15 10:42:46.727849 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] May 15 10:42:46.727897 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] May 15 10:42:46.727943 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] May 15 10:42:46.727989 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] May 15 10:42:46.728035 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] May 15 10:42:46.728081 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] May 15 10:42:46.728128 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] May 15 10:42:46.728172 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] May 15 10:42:46.729034 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] May 15 10:42:46.729096 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] May 15 10:42:46.729146 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] May 15 10:42:46.729195 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] May 15 10:42:46.729277 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] May 15 10:42:46.729324 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] May 15 10:42:46.729369 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] May 15 10:42:46.729416 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] May 15 10:42:46.729463 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] May 15 10:42:46.729508 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] May 15 10:42:46.729556 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] May 15 10:42:46.729604 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] May 15 10:42:46.729650 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] May 15 10:42:46.729702 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] May 15 10:42:46.729748 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] May 15 10:42:46.729794 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] May 15 10:42:46.729840 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] May 15 10:42:46.729885 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] May 15 10:42:46.729930 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] May 15 10:42:46.729975 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] May 15 10:42:46.730025 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] May 15 10:42:46.730071 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] May 15 10:42:46.730116 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] May 15 10:42:46.730162 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] May 15 10:42:46.731264 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] May 15 10:42:46.731325 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] May 15 10:42:46.731375 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] May 15 10:42:46.731424 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] May 15 10:42:46.731471 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] May 15 10:42:46.731518 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] May 15 10:42:46.731569 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] May 15 10:42:46.731615 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] May 15 10:42:46.731661 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] May 15 10:42:46.731708 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] May 15 10:42:46.731754 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] May 15 10:42:46.731799 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] May 15 10:42:46.731847 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] May 15 10:42:46.731893 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] May 15 10:42:46.731938 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] May 15 10:42:46.731988 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] May 15 10:42:46.732033 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] May 15 10:42:46.732079 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] May 15 10:42:46.732125 kernel: pci_bus 0000:00: resource 4 [mem 0x000a0000-0x000bffff window] May 15 10:42:46.732166 kernel: pci_bus 0000:00: resource 5 [mem 0x000cc000-0x000dbfff window] May 15 10:42:46.733254 kernel: pci_bus 0000:00: resource 6 [mem 0xc0000000-0xfebfffff window] May 15 10:42:46.733304 kernel: pci_bus 0000:00: resource 7 [io 0x0000-0x0cf7 window] May 15 10:42:46.733346 kernel: pci_bus 0000:00: resource 8 [io 0x0d00-0xfeff window] May 15 10:42:46.733391 kernel: pci_bus 0000:02: resource 0 [io 0x2000-0x3fff] May 15 10:42:46.733438 kernel: pci_bus 0000:02: resource 1 [mem 0xfd600000-0xfdffffff] May 15 10:42:46.733480 kernel: pci_bus 0000:02: resource 2 [mem 0xe7b00000-0xe7ffffff 64bit pref] May 15 10:42:46.733522 kernel: pci_bus 0000:02: resource 4 [mem 0x000a0000-0x000bffff window] May 15 10:42:46.733563 kernel: pci_bus 0000:02: resource 5 [mem 0x000cc000-0x000dbfff window] May 15 10:42:46.733605 kernel: pci_bus 0000:02: resource 6 [mem 0xc0000000-0xfebfffff window] May 15 10:42:46.733646 kernel: pci_bus 0000:02: resource 7 [io 0x0000-0x0cf7 window] May 15 10:42:46.733694 kernel: pci_bus 0000:02: resource 8 [io 0x0d00-0xfeff window] May 15 10:42:46.733746 kernel: pci_bus 0000:03: resource 0 [io 0x4000-0x4fff] May 15 10:42:46.733788 kernel: pci_bus 0000:03: resource 1 [mem 0xfd500000-0xfd5fffff] May 15 10:42:46.733830 kernel: pci_bus 0000:03: resource 2 [mem 0xc0000000-0xc01fffff 64bit pref] May 15 10:42:46.733876 kernel: pci_bus 0000:04: resource 0 [io 0x8000-0x8fff] May 15 10:42:46.733918 kernel: pci_bus 0000:04: resource 1 [mem 0xfd100000-0xfd1fffff] May 15 10:42:46.733961 kernel: pci_bus 0000:04: resource 2 [mem 0xe7800000-0xe78fffff 64bit pref] May 15 10:42:46.734007 kernel: pci_bus 0000:05: resource 0 [io 0xc000-0xcfff] May 15 10:42:46.734051 kernel: pci_bus 0000:05: resource 1 [mem 0xfcd00000-0xfcdfffff] May 15 10:42:46.734093 kernel: pci_bus 0000:05: resource 2 [mem 0xe7400000-0xe74fffff 64bit pref] May 15 10:42:46.734141 kernel: pci_bus 0000:06: resource 1 [mem 0xfc900000-0xfc9fffff] May 15 10:42:46.734183 kernel: pci_bus 0000:06: resource 2 [mem 0xe7000000-0xe70fffff 64bit pref] May 15 10:42:46.735287 kernel: pci_bus 0000:07: resource 1 [mem 0xfc500000-0xfc5fffff] May 15 10:42:46.735339 kernel: pci_bus 0000:07: resource 2 [mem 0xe6c00000-0xe6cfffff 64bit pref] May 15 10:42:46.735391 kernel: pci_bus 0000:08: resource 1 [mem 0xfc100000-0xfc1fffff] May 15 10:42:46.735435 kernel: pci_bus 0000:08: resource 2 [mem 0xe6800000-0xe68fffff 64bit pref] May 15 10:42:46.735482 kernel: pci_bus 0000:09: resource 1 [mem 0xfbd00000-0xfbdfffff] May 15 10:42:46.735525 kernel: pci_bus 0000:09: resource 2 [mem 0xe6400000-0xe64fffff 64bit pref] May 15 10:42:46.735574 kernel: pci_bus 0000:0a: resource 1 [mem 0xfb900000-0xfb9fffff] May 15 10:42:46.735617 kernel: pci_bus 0000:0a: resource 2 [mem 0xe6000000-0xe60fffff 64bit pref] May 15 10:42:46.735667 kernel: pci_bus 0000:0b: resource 0 [io 0x5000-0x5fff] May 15 10:42:46.735710 kernel: pci_bus 0000:0b: resource 1 [mem 0xfd400000-0xfd4fffff] May 15 10:42:46.735751 kernel: pci_bus 0000:0b: resource 2 [mem 0xc0200000-0xc03fffff 64bit pref] May 15 10:42:46.735797 kernel: pci_bus 0000:0c: resource 0 [io 0x9000-0x9fff] May 15 10:42:46.735840 kernel: pci_bus 0000:0c: resource 1 [mem 0xfd000000-0xfd0fffff] May 15 10:42:46.735885 kernel: pci_bus 0000:0c: resource 2 [mem 0xe7700000-0xe77fffff 64bit pref] May 15 10:42:46.735940 kernel: pci_bus 0000:0d: resource 0 [io 0xd000-0xdfff] May 15 10:42:46.735985 kernel: pci_bus 0000:0d: resource 1 [mem 0xfcc00000-0xfccfffff] May 15 10:42:46.736027 kernel: pci_bus 0000:0d: resource 2 [mem 0xe7300000-0xe73fffff 64bit pref] May 15 10:42:46.736074 kernel: pci_bus 0000:0e: resource 1 [mem 0xfc800000-0xfc8fffff] May 15 10:42:46.736117 kernel: pci_bus 0000:0e: resource 2 [mem 0xe6f00000-0xe6ffffff 64bit pref] May 15 10:42:46.736164 kernel: pci_bus 0000:0f: resource 1 [mem 0xfc400000-0xfc4fffff] May 15 10:42:46.737246 kernel: pci_bus 0000:0f: resource 2 [mem 0xe6b00000-0xe6bfffff 64bit pref] May 15 10:42:46.737307 kernel: pci_bus 0000:10: resource 1 [mem 0xfc000000-0xfc0fffff] May 15 10:42:46.737353 kernel: pci_bus 0000:10: resource 2 [mem 0xe6700000-0xe67fffff 64bit pref] May 15 10:42:46.737401 kernel: pci_bus 0000:11: resource 1 [mem 0xfbc00000-0xfbcfffff] May 15 10:42:46.737445 kernel: pci_bus 0000:11: resource 2 [mem 0xe6300000-0xe63fffff 64bit pref] May 15 10:42:46.737493 kernel: pci_bus 0000:12: resource 1 [mem 0xfb800000-0xfb8fffff] May 15 10:42:46.737537 kernel: pci_bus 0000:12: resource 2 [mem 0xe5f00000-0xe5ffffff 64bit pref] May 15 10:42:46.737586 kernel: pci_bus 0000:13: resource 0 [io 0x6000-0x6fff] May 15 10:42:46.737629 kernel: pci_bus 0000:13: resource 1 [mem 0xfd300000-0xfd3fffff] May 15 10:42:46.737671 kernel: pci_bus 0000:13: resource 2 [mem 0xe7a00000-0xe7afffff 64bit pref] May 15 10:42:46.737718 kernel: pci_bus 0000:14: resource 0 [io 0xa000-0xafff] May 15 10:42:46.737760 kernel: pci_bus 0000:14: resource 1 [mem 0xfcf00000-0xfcffffff] May 15 10:42:46.737802 kernel: pci_bus 0000:14: resource 2 [mem 0xe7600000-0xe76fffff 64bit pref] May 15 10:42:46.737848 kernel: pci_bus 0000:15: resource 0 [io 0xe000-0xefff] May 15 10:42:46.737897 kernel: pci_bus 0000:15: resource 1 [mem 0xfcb00000-0xfcbfffff] May 15 10:42:46.737939 kernel: pci_bus 0000:15: resource 2 [mem 0xe7200000-0xe72fffff 64bit pref] May 15 10:42:46.738000 kernel: pci_bus 0000:16: resource 1 [mem 0xfc700000-0xfc7fffff] May 15 10:42:46.738043 kernel: pci_bus 0000:16: resource 2 [mem 0xe6e00000-0xe6efffff 64bit pref] May 15 10:42:46.738093 kernel: pci_bus 0000:17: resource 1 [mem 0xfc300000-0xfc3fffff] May 15 10:42:46.738138 kernel: pci_bus 0000:17: resource 2 [mem 0xe6a00000-0xe6afffff 64bit pref] May 15 10:42:46.738188 kernel: pci_bus 0000:18: resource 1 [mem 0xfbf00000-0xfbffffff] May 15 10:42:46.739276 kernel: pci_bus 0000:18: resource 2 [mem 0xe6600000-0xe66fffff 64bit pref] May 15 10:42:46.739330 kernel: pci_bus 0000:19: resource 1 [mem 0xfbb00000-0xfbbfffff] May 15 10:42:46.739375 kernel: pci_bus 0000:19: resource 2 [mem 0xe6200000-0xe62fffff 64bit pref] May 15 10:42:46.739422 kernel: pci_bus 0000:1a: resource 1 [mem 0xfb700000-0xfb7fffff] May 15 10:42:46.739469 kernel: pci_bus 0000:1a: resource 2 [mem 0xe5e00000-0xe5efffff 64bit pref] May 15 10:42:46.739518 kernel: pci_bus 0000:1b: resource 0 [io 0x7000-0x7fff] May 15 10:42:46.739562 kernel: pci_bus 0000:1b: resource 1 [mem 0xfd200000-0xfd2fffff] May 15 10:42:46.739605 kernel: pci_bus 0000:1b: resource 2 [mem 0xe7900000-0xe79fffff 64bit pref] May 15 10:42:46.739654 kernel: pci_bus 0000:1c: resource 0 [io 0xb000-0xbfff] May 15 10:42:46.739703 kernel: pci_bus 0000:1c: resource 1 [mem 0xfce00000-0xfcefffff] May 15 10:42:46.739746 kernel: pci_bus 0000:1c: resource 2 [mem 0xe7500000-0xe75fffff 64bit pref] May 15 10:42:46.739792 kernel: pci_bus 0000:1d: resource 1 [mem 0xfca00000-0xfcafffff] May 15 10:42:46.739837 kernel: pci_bus 0000:1d: resource 2 [mem 0xe7100000-0xe71fffff 64bit pref] May 15 10:42:46.739887 kernel: pci_bus 0000:1e: resource 1 [mem 0xfc600000-0xfc6fffff] May 15 10:42:46.739930 kernel: pci_bus 0000:1e: resource 2 [mem 0xe6d00000-0xe6dfffff 64bit pref] May 15 10:42:46.739977 kernel: pci_bus 0000:1f: resource 1 [mem 0xfc200000-0xfc2fffff] May 15 10:42:46.740020 kernel: pci_bus 0000:1f: resource 2 [mem 0xe6900000-0xe69fffff 64bit pref] May 15 10:42:46.740069 kernel: pci_bus 0000:20: resource 1 [mem 0xfbe00000-0xfbefffff] May 15 10:42:46.740113 kernel: pci_bus 0000:20: resource 2 [mem 0xe6500000-0xe65fffff 64bit pref] May 15 10:42:46.740160 kernel: pci_bus 0000:21: resource 1 [mem 0xfba00000-0xfbafffff] May 15 10:42:46.740210 kernel: pci_bus 0000:21: resource 2 [mem 0xe6100000-0xe61fffff 64bit pref] May 15 10:42:46.740258 kernel: pci_bus 0000:22: resource 1 [mem 0xfb600000-0xfb6fffff] May 15 10:42:46.740302 kernel: pci_bus 0000:22: resource 2 [mem 0xe5d00000-0xe5dfffff 64bit pref] May 15 10:42:46.740355 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers May 15 10:42:46.740367 kernel: PCI: CLS 32 bytes, default 64 May 15 10:42:46.740374 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer May 15 10:42:46.740381 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns May 15 10:42:46.740387 kernel: clocksource: Switched to clocksource tsc May 15 10:42:46.740393 kernel: Initialise system trusted keyrings May 15 10:42:46.740400 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 May 15 10:42:46.740406 kernel: Key type asymmetric registered May 15 10:42:46.740412 kernel: Asymmetric key parser 'x509' registered May 15 10:42:46.740420 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 15 10:42:46.740426 kernel: io scheduler mq-deadline registered May 15 10:42:46.740432 kernel: io scheduler kyber registered May 15 10:42:46.740438 kernel: io scheduler bfq registered May 15 10:42:46.740489 kernel: pcieport 0000:00:15.0: PME: Signaling with IRQ 24 May 15 10:42:46.740538 kernel: pcieport 0000:00:15.0: pciehp: Slot #160 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:42:46.740587 kernel: pcieport 0000:00:15.1: PME: Signaling with IRQ 25 May 15 10:42:46.740634 kernel: pcieport 0000:00:15.1: pciehp: Slot #161 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:42:46.740696 kernel: pcieport 0000:00:15.2: PME: Signaling with IRQ 26 May 15 10:42:46.740749 kernel: pcieport 0000:00:15.2: pciehp: Slot #162 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:42:46.740797 kernel: pcieport 0000:00:15.3: PME: Signaling with IRQ 27 May 15 10:42:46.740844 kernel: pcieport 0000:00:15.3: pciehp: Slot #163 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:42:46.740892 kernel: pcieport 0000:00:15.4: PME: Signaling with IRQ 28 May 15 10:42:46.740939 kernel: pcieport 0000:00:15.4: pciehp: Slot #164 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:42:46.740988 kernel: pcieport 0000:00:15.5: PME: Signaling with IRQ 29 May 15 10:42:46.741035 kernel: pcieport 0000:00:15.5: pciehp: Slot #165 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:42:46.741083 kernel: pcieport 0000:00:15.6: PME: Signaling with IRQ 30 May 15 10:42:46.741129 kernel: pcieport 0000:00:15.6: pciehp: Slot #166 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:42:46.741176 kernel: pcieport 0000:00:15.7: PME: Signaling with IRQ 31 May 15 10:42:46.741236 kernel: pcieport 0000:00:15.7: pciehp: Slot #167 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:42:46.741288 kernel: pcieport 0000:00:16.0: PME: Signaling with IRQ 32 May 15 10:42:46.741334 kernel: pcieport 0000:00:16.0: pciehp: Slot #192 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:42:46.741382 kernel: pcieport 0000:00:16.1: PME: Signaling with IRQ 33 May 15 10:42:46.741428 kernel: pcieport 0000:00:16.1: pciehp: Slot #193 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:42:46.741475 kernel: pcieport 0000:00:16.2: PME: Signaling with IRQ 34 May 15 10:42:46.741522 kernel: pcieport 0000:00:16.2: pciehp: Slot #194 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:42:46.741570 kernel: pcieport 0000:00:16.3: PME: Signaling with IRQ 35 May 15 10:42:46.741619 kernel: pcieport 0000:00:16.3: pciehp: Slot #195 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:42:46.741667 kernel: pcieport 0000:00:16.4: PME: Signaling with IRQ 36 May 15 10:42:46.741714 kernel: pcieport 0000:00:16.4: pciehp: Slot #196 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:42:46.741762 kernel: pcieport 0000:00:16.5: PME: Signaling with IRQ 37 May 15 10:42:46.741808 kernel: pcieport 0000:00:16.5: pciehp: Slot #197 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:42:46.741858 kernel: pcieport 0000:00:16.6: PME: Signaling with IRQ 38 May 15 10:42:46.741908 kernel: pcieport 0000:00:16.6: pciehp: Slot #198 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:42:46.741956 kernel: pcieport 0000:00:16.7: PME: Signaling with IRQ 39 May 15 10:42:46.742002 kernel: pcieport 0000:00:16.7: pciehp: Slot #199 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:42:46.742050 kernel: pcieport 0000:00:17.0: PME: Signaling with IRQ 40 May 15 10:42:46.742097 kernel: pcieport 0000:00:17.0: pciehp: Slot #224 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:42:46.742146 kernel: pcieport 0000:00:17.1: PME: Signaling with IRQ 41 May 15 10:42:46.742193 kernel: pcieport 0000:00:17.1: pciehp: Slot #225 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:42:46.746438 kernel: pcieport 0000:00:17.2: PME: Signaling with IRQ 42 May 15 10:42:46.746491 kernel: pcieport 0000:00:17.2: pciehp: Slot #226 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:42:46.746542 kernel: pcieport 0000:00:17.3: PME: Signaling with IRQ 43 May 15 10:42:46.746591 kernel: pcieport 0000:00:17.3: pciehp: Slot #227 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:42:46.746643 kernel: pcieport 0000:00:17.4: PME: Signaling with IRQ 44 May 15 10:42:46.746696 kernel: pcieport 0000:00:17.4: pciehp: Slot #228 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:42:46.746745 kernel: pcieport 0000:00:17.5: PME: Signaling with IRQ 45 May 15 10:42:46.746793 kernel: pcieport 0000:00:17.5: pciehp: Slot #229 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:42:46.746841 kernel: pcieport 0000:00:17.6: PME: Signaling with IRQ 46 May 15 10:42:46.746891 kernel: pcieport 0000:00:17.6: pciehp: Slot #230 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:42:46.746939 kernel: pcieport 0000:00:17.7: PME: Signaling with IRQ 47 May 15 10:42:46.746986 kernel: pcieport 0000:00:17.7: pciehp: Slot #231 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:42:46.747034 kernel: pcieport 0000:00:18.0: PME: Signaling with IRQ 48 May 15 10:42:46.747080 kernel: pcieport 0000:00:18.0: pciehp: Slot #256 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:42:46.747127 kernel: pcieport 0000:00:18.1: PME: Signaling with IRQ 49 May 15 10:42:46.747174 kernel: pcieport 0000:00:18.1: pciehp: Slot #257 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:42:46.747315 kernel: pcieport 0000:00:18.2: PME: Signaling with IRQ 50 May 15 10:42:46.747364 kernel: pcieport 0000:00:18.2: pciehp: Slot #258 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:42:46.747411 kernel: pcieport 0000:00:18.3: PME: Signaling with IRQ 51 May 15 10:42:46.747458 kernel: pcieport 0000:00:18.3: pciehp: Slot #259 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:42:46.747506 kernel: pcieport 0000:00:18.4: PME: Signaling with IRQ 52 May 15 10:42:46.747555 kernel: pcieport 0000:00:18.4: pciehp: Slot #260 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:42:46.747604 kernel: pcieport 0000:00:18.5: PME: Signaling with IRQ 53 May 15 10:42:46.747651 kernel: pcieport 0000:00:18.5: pciehp: Slot #261 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:42:46.747698 kernel: pcieport 0000:00:18.6: PME: Signaling with IRQ 54 May 15 10:42:46.747744 kernel: pcieport 0000:00:18.6: pciehp: Slot #262 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:42:46.747793 kernel: pcieport 0000:00:18.7: PME: Signaling with IRQ 55 May 15 10:42:46.747839 kernel: pcieport 0000:00:18.7: pciehp: Slot #263 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ May 15 10:42:46.747848 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 15 10:42:46.747854 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 15 10:42:46.747861 kernel: 00:05: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 15 10:42:46.747868 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBC,PNP0f13:MOUS] at 0x60,0x64 irq 1,12 May 15 10:42:46.747874 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 15 10:42:46.747880 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 15 10:42:46.747932 kernel: rtc_cmos 00:01: registered as rtc0 May 15 10:42:46.747977 kernel: rtc_cmos 00:01: setting system clock to 2025-05-15T10:42:46 UTC (1747305766) May 15 10:42:46.748019 kernel: rtc_cmos 00:01: alarms up to one month, y3k, 114 bytes nvram May 15 10:42:46.748028 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 15 10:42:46.748035 kernel: intel_pstate: CPU model not supported May 15 10:42:46.748041 kernel: NET: Registered PF_INET6 protocol family May 15 10:42:46.748047 kernel: Segment Routing with IPv6 May 15 10:42:46.748054 kernel: In-situ OAM (IOAM) with IPv6 May 15 10:42:46.748061 kernel: NET: Registered PF_PACKET protocol family May 15 10:42:46.748068 kernel: Key type dns_resolver registered May 15 10:42:46.748074 kernel: IPI shorthand broadcast: enabled May 15 10:42:46.748080 kernel: sched_clock: Marking stable (843420462, 223057977)->(1132104691, -65626252) May 15 10:42:46.748087 kernel: registered taskstats version 1 May 15 10:42:46.748093 kernel: Loading compiled-in X.509 certificates May 15 10:42:46.748099 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.182-flatcar: 04007c306af6b7696d09b3c2eafc1297036fd28e' May 15 10:42:46.748105 kernel: Key type .fscrypt registered May 15 10:42:46.748111 kernel: Key type fscrypt-provisioning registered May 15 10:42:46.748118 kernel: ima: No TPM chip found, activating TPM-bypass! May 15 10:42:46.748125 kernel: ima: Allocated hash algorithm: sha1 May 15 10:42:46.748131 kernel: ima: No architecture policies found May 15 10:42:46.748139 kernel: clk: Disabling unused clocks May 15 10:42:46.748145 kernel: Freeing unused kernel image (initmem) memory: 47472K May 15 10:42:46.748152 kernel: Write protecting the kernel read-only data: 28672k May 15 10:42:46.748158 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 15 10:42:46.748164 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 15 10:42:46.748170 kernel: Run /init as init process May 15 10:42:46.748177 kernel: with arguments: May 15 10:42:46.748184 kernel: /init May 15 10:42:46.748190 kernel: with environment: May 15 10:42:46.748202 kernel: HOME=/ May 15 10:42:46.748210 kernel: TERM=linux May 15 10:42:46.748216 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 15 10:42:46.748224 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 15 10:42:46.748232 systemd[1]: Detected virtualization vmware. May 15 10:42:46.748241 systemd[1]: Detected architecture x86-64. May 15 10:42:46.748247 systemd[1]: Running in initrd. May 15 10:42:46.748253 systemd[1]: No hostname configured, using default hostname. May 15 10:42:46.748259 systemd[1]: Hostname set to . May 15 10:42:46.748266 systemd[1]: Initializing machine ID from random generator. May 15 10:42:46.748273 systemd[1]: Queued start job for default target initrd.target. May 15 10:42:46.748279 systemd[1]: Started systemd-ask-password-console.path. May 15 10:42:46.748285 systemd[1]: Reached target cryptsetup.target. May 15 10:42:46.748293 systemd[1]: Reached target paths.target. May 15 10:42:46.748300 systemd[1]: Reached target slices.target. May 15 10:42:46.748306 systemd[1]: Reached target swap.target. May 15 10:42:46.748312 systemd[1]: Reached target timers.target. May 15 10:42:46.748318 systemd[1]: Listening on iscsid.socket. May 15 10:42:46.748325 systemd[1]: Listening on iscsiuio.socket. May 15 10:42:46.748331 systemd[1]: Listening on systemd-journald-audit.socket. May 15 10:42:46.748338 systemd[1]: Listening on systemd-journald-dev-log.socket. May 15 10:42:46.748345 systemd[1]: Listening on systemd-journald.socket. May 15 10:42:46.748351 systemd[1]: Listening on systemd-networkd.socket. May 15 10:42:46.748357 systemd[1]: Listening on systemd-udevd-control.socket. May 15 10:42:46.748363 systemd[1]: Listening on systemd-udevd-kernel.socket. May 15 10:42:46.748370 systemd[1]: Reached target sockets.target. May 15 10:42:46.748376 systemd[1]: Starting kmod-static-nodes.service... May 15 10:42:46.748383 systemd[1]: Finished network-cleanup.service. May 15 10:42:46.748389 systemd[1]: Starting systemd-fsck-usr.service... May 15 10:42:46.748397 systemd[1]: Starting systemd-journald.service... May 15 10:42:46.748403 systemd[1]: Starting systemd-modules-load.service... May 15 10:42:46.748409 systemd[1]: Starting systemd-resolved.service... May 15 10:42:46.748416 systemd[1]: Starting systemd-vconsole-setup.service... May 15 10:42:46.748422 systemd[1]: Finished kmod-static-nodes.service. May 15 10:42:46.748428 systemd[1]: Finished systemd-fsck-usr.service. May 15 10:42:46.748435 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 15 10:42:46.748441 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 15 10:42:46.748447 kernel: audit: type=1130 audit(1747305766.676:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:46.748456 systemd[1]: Finished systemd-vconsole-setup.service. May 15 10:42:46.748462 kernel: audit: type=1130 audit(1747305766.679:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:46.748469 systemd[1]: Starting dracut-cmdline-ask.service... May 15 10:42:46.748475 systemd[1]: Started systemd-resolved.service. May 15 10:42:46.748481 systemd[1]: Reached target nss-lookup.target. May 15 10:42:46.748488 kernel: audit: type=1130 audit(1747305766.686:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:46.748494 systemd[1]: Finished dracut-cmdline-ask.service. May 15 10:42:46.748500 kernel: audit: type=1130 audit(1747305766.694:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:46.748508 systemd[1]: Starting dracut-cmdline.service... May 15 10:42:46.748515 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 15 10:42:46.748521 kernel: Bridge firewalling registered May 15 10:42:46.748527 kernel: SCSI subsystem initialized May 15 10:42:46.748538 systemd-journald[217]: Journal started May 15 10:42:46.748574 systemd-journald[217]: Runtime Journal (/run/log/journal/77e06916df1c419492760f0a28fb7bdb) is 4.8M, max 38.8M, 34.0M free. May 15 10:42:46.676000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:46.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:46.686000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:46.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:46.666252 systemd-modules-load[218]: Inserted module 'overlay' May 15 10:42:46.750238 systemd[1]: Started systemd-journald.service. May 15 10:42:46.684634 systemd-resolved[219]: Positive Trust Anchors: May 15 10:42:46.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:46.684642 systemd-resolved[219]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 15 10:42:46.684663 systemd-resolved[219]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 15 10:42:46.753431 kernel: audit: type=1130 audit(1747305766.749:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:46.686397 systemd-resolved[219]: Defaulting to hostname 'linux'. May 15 10:42:46.728223 systemd-modules-load[218]: Inserted module 'br_netfilter' May 15 10:42:46.753872 dracut-cmdline[232]: dracut-dracut-053 May 15 10:42:46.753872 dracut-cmdline[232]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA May 15 10:42:46.753872 dracut-cmdline[232]: BEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=f8c1bc5ff10765e781843bfc97fc5357002a3f8a120201a0e954fce1d2ba48f0 May 15 10:42:46.755207 kernel: Loading iSCSI transport class v2.0-870. May 15 10:42:46.759278 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 15 10:42:46.759305 kernel: device-mapper: uevent: version 1.0.3 May 15 10:42:46.759314 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 15 10:42:46.762299 systemd-modules-load[218]: Inserted module 'dm_multipath' May 15 10:42:46.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:46.762701 systemd[1]: Finished systemd-modules-load.service. May 15 10:42:46.763229 systemd[1]: Starting systemd-sysctl.service... May 15 10:42:46.766491 kernel: audit: type=1130 audit(1747305766.761:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:46.768000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:46.769328 systemd[1]: Finished systemd-sysctl.service. May 15 10:42:46.772257 kernel: audit: type=1130 audit(1747305766.768:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:46.773241 kernel: iscsi: registered transport (tcp) May 15 10:42:46.788465 kernel: iscsi: registered transport (qla4xxx) May 15 10:42:46.788508 kernel: QLogic iSCSI HBA Driver May 15 10:42:46.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:46.805399 systemd[1]: Finished dracut-cmdline.service. May 15 10:42:46.809123 kernel: audit: type=1130 audit(1747305766.804:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:46.805996 systemd[1]: Starting dracut-pre-udev.service... May 15 10:42:46.843218 kernel: raid6: avx2x4 gen() 48033 MB/s May 15 10:42:46.860211 kernel: raid6: avx2x4 xor() 21693 MB/s May 15 10:42:46.877211 kernel: raid6: avx2x2 gen() 53270 MB/s May 15 10:42:46.894212 kernel: raid6: avx2x2 xor() 31970 MB/s May 15 10:42:46.911210 kernel: raid6: avx2x1 gen() 44686 MB/s May 15 10:42:46.928223 kernel: raid6: avx2x1 xor() 27712 MB/s May 15 10:42:46.945222 kernel: raid6: sse2x4 gen() 21096 MB/s May 15 10:42:46.962210 kernel: raid6: sse2x4 xor() 11846 MB/s May 15 10:42:46.979208 kernel: raid6: sse2x2 gen() 21440 MB/s May 15 10:42:46.996240 kernel: raid6: sse2x2 xor() 13272 MB/s May 15 10:42:47.013211 kernel: raid6: sse2x1 gen() 18013 MB/s May 15 10:42:47.030382 kernel: raid6: sse2x1 xor() 8929 MB/s May 15 10:42:47.030402 kernel: raid6: using algorithm avx2x2 gen() 53270 MB/s May 15 10:42:47.030410 kernel: raid6: .... xor() 31970 MB/s, rmw enabled May 15 10:42:47.031563 kernel: raid6: using avx2x2 recovery algorithm May 15 10:42:47.040210 kernel: xor: automatically using best checksumming function avx May 15 10:42:47.100215 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 15 10:42:47.104330 systemd[1]: Finished dracut-pre-udev.service. May 15 10:42:47.104925 systemd[1]: Starting systemd-udevd.service... May 15 10:42:47.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:47.103000 audit: BPF prog-id=7 op=LOAD May 15 10:42:47.103000 audit: BPF prog-id=8 op=LOAD May 15 10:42:47.110218 kernel: audit: type=1130 audit(1747305767.103:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:47.115311 systemd-udevd[414]: Using default interface naming scheme 'v252'. May 15 10:42:47.118001 systemd[1]: Started systemd-udevd.service. May 15 10:42:47.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:47.118565 systemd[1]: Starting dracut-pre-trigger.service... May 15 10:42:47.127138 dracut-pre-trigger[415]: rd.md=0: removing MD RAID activation May 15 10:42:47.144287 systemd[1]: Finished dracut-pre-trigger.service. May 15 10:42:47.143000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:47.144835 systemd[1]: Starting systemd-udev-trigger.service... May 15 10:42:47.211028 systemd[1]: Finished systemd-udev-trigger.service. May 15 10:42:47.209000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:47.279217 kernel: VMware PVSCSI driver - version 1.0.7.0-k May 15 10:42:47.279253 kernel: vmw_pvscsi: using 64bit dma May 15 10:42:47.280711 kernel: vmw_pvscsi: max_id: 16 May 15 10:42:47.280732 kernel: vmw_pvscsi: setting ring_pages to 8 May 15 10:42:47.282557 kernel: VMware vmxnet3 virtual NIC driver - version 1.6.0.0-k-NAPI May 15 10:42:47.282584 kernel: vmw_pvscsi: enabling reqCallThreshold May 15 10:42:47.284213 kernel: vmw_pvscsi: driver-based request coalescing enabled May 15 10:42:47.284236 kernel: vmw_pvscsi: using MSI-X May 15 10:42:47.286294 kernel: vmxnet3 0000:0b:00.0: # of Tx queues : 2, # of Rx queues : 2 May 15 10:42:47.296943 kernel: scsi host0: VMware PVSCSI storage adapter rev 2, req/cmp/msg rings: 8/8/1 pages, cmd_per_lun=254 May 15 10:42:47.297026 kernel: vmw_pvscsi 0000:03:00.0: VMware PVSCSI rev 2 host #0 May 15 10:42:47.297086 kernel: vmxnet3 0000:0b:00.0 eth0: NIC Link is Up 10000 Mbps May 15 10:42:47.297141 kernel: scsi 0:0:0:0: Direct-Access VMware Virtual disk 2.0 PQ: 0 ANSI: 6 May 15 10:42:47.310214 kernel: cryptd: max_cpu_qlen set to 1000 May 15 10:42:47.312214 kernel: vmxnet3 0000:0b:00.0 ens192: renamed from eth0 May 15 10:42:47.326272 kernel: sd 0:0:0:0: [sda] 17805312 512-byte logical blocks: (9.12 GB/8.49 GiB) May 15 10:42:47.338621 kernel: sd 0:0:0:0: [sda] Write Protect is off May 15 10:42:47.338709 kernel: sd 0:0:0:0: [sda] Mode Sense: 31 00 00 00 May 15 10:42:47.338770 kernel: sd 0:0:0:0: [sda] Cache data unavailable May 15 10:42:47.338831 kernel: sd 0:0:0:0: [sda] Assuming drive cache: write through May 15 10:42:47.338890 kernel: AVX2 version of gcm_enc/dec engaged. May 15 10:42:47.338899 kernel: AES CTR mode by8 optimization enabled May 15 10:42:47.338906 kernel: libata version 3.00 loaded. May 15 10:42:47.338917 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 15 10:42:47.338924 kernel: sd 0:0:0:0: [sda] Attached SCSI disk May 15 10:42:47.342246 kernel: ata_piix 0000:00:07.1: version 2.13 May 15 10:42:47.347443 kernel: scsi host1: ata_piix May 15 10:42:47.347553 kernel: scsi host2: ata_piix May 15 10:42:47.347626 kernel: ata1: PATA max UDMA/33 cmd 0x1f0 ctl 0x3f6 bmdma 0x1060 irq 14 May 15 10:42:47.347635 kernel: ata2: PATA max UDMA/33 cmd 0x170 ctl 0x376 bmdma 0x1068 irq 15 May 15 10:42:47.372220 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 15 10:42:47.373207 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (467) May 15 10:42:47.380101 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 15 10:42:47.381738 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 15 10:42:47.381886 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 15 10:42:47.382597 systemd[1]: Starting disk-uuid.service... May 15 10:42:47.401892 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 15 10:42:47.516215 kernel: ata2.00: ATAPI: VMware Virtual IDE CDROM Drive, 00000001, max UDMA/33 May 15 10:42:47.520211 kernel: scsi 2:0:0:0: CD-ROM NECVMWar VMware IDE CDR10 1.00 PQ: 0 ANSI: 5 May 15 10:42:47.549638 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 1x/1x writer dvd-ram cd/rw xa/form2 cdda tray May 15 10:42:47.567779 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 May 15 10:42:47.567798 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 May 15 10:42:48.454573 disk-uuid[537]: The operation has completed successfully. May 15 10:42:48.455213 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 15 10:42:48.603699 systemd[1]: disk-uuid.service: Deactivated successfully. May 15 10:42:48.603751 systemd[1]: Finished disk-uuid.service. May 15 10:42:48.602000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:48.602000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:48.604382 systemd[1]: Starting verity-setup.service... May 15 10:42:48.614216 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" May 15 10:42:48.651019 systemd[1]: Found device dev-mapper-usr.device. May 15 10:42:48.651490 systemd[1]: Mounting sysusr-usr.mount... May 15 10:42:48.652142 systemd[1]: Finished verity-setup.service. May 15 10:42:48.651000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:48.702214 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 15 10:42:48.702264 systemd[1]: Mounted sysusr-usr.mount. May 15 10:42:48.702844 systemd[1]: Starting afterburn-network-kargs.service... May 15 10:42:48.703303 systemd[1]: Starting ignition-setup.service... May 15 10:42:48.718091 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm May 15 10:42:48.718127 kernel: BTRFS info (device sda6): using free space tree May 15 10:42:48.718140 kernel: BTRFS info (device sda6): has skinny extents May 15 10:42:48.722209 kernel: BTRFS info (device sda6): enabling ssd optimizations May 15 10:42:48.727873 systemd[1]: mnt-oem.mount: Deactivated successfully. May 15 10:42:48.750000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:48.751293 systemd[1]: Finished ignition-setup.service. May 15 10:42:48.751892 systemd[1]: Starting ignition-fetch-offline.service... May 15 10:42:48.814293 systemd[1]: Finished afterburn-network-kargs.service. May 15 10:42:48.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:48.814917 systemd[1]: Starting parse-ip-for-networkd.service... May 15 10:42:48.863060 systemd[1]: Finished parse-ip-for-networkd.service. May 15 10:42:48.862000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:48.862000 audit: BPF prog-id=9 op=LOAD May 15 10:42:48.863975 systemd[1]: Starting systemd-networkd.service... May 15 10:42:48.877630 systemd-networkd[733]: lo: Link UP May 15 10:42:48.877844 systemd-networkd[733]: lo: Gained carrier May 15 10:42:48.878267 systemd-networkd[733]: Enumeration completed May 15 10:42:48.878454 systemd[1]: Started systemd-networkd.service. May 15 10:42:48.878614 systemd[1]: Reached target network.target. May 15 10:42:48.877000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:48.878799 systemd-networkd[733]: ens192: Configuring with /etc/systemd/network/10-dracut-cmdline-99.network. May 15 10:42:48.879670 systemd[1]: Starting iscsiuio.service... May 15 10:42:48.882609 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated May 15 10:42:48.882748 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps May 15 10:42:48.882735 systemd[1]: Started iscsiuio.service. May 15 10:42:48.881000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:48.883369 systemd-networkd[733]: ens192: Link UP May 15 10:42:48.883489 systemd-networkd[733]: ens192: Gained carrier May 15 10:42:48.883688 systemd[1]: Starting iscsid.service... May 15 10:42:48.887167 iscsid[738]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 15 10:42:48.887167 iscsid[738]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 15 10:42:48.887167 iscsid[738]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 15 10:42:48.887167 iscsid[738]: If using hardware iscsi like qla4xxx this message can be ignored. May 15 10:42:48.887167 iscsid[738]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 15 10:42:48.887167 iscsid[738]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 15 10:42:48.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:48.887174 systemd[1]: Started iscsid.service. May 15 10:42:48.888983 systemd[1]: Starting dracut-initqueue.service... May 15 10:42:48.897045 systemd[1]: Finished dracut-initqueue.service. May 15 10:42:48.895000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:48.897236 systemd[1]: Reached target remote-fs-pre.target. May 15 10:42:48.897328 systemd[1]: Reached target remote-cryptsetup.target. May 15 10:42:48.897771 systemd[1]: Reached target remote-fs.target. May 15 10:42:48.898432 systemd[1]: Starting dracut-pre-mount.service... May 15 10:42:48.902696 ignition[604]: Ignition 2.14.0 May 15 10:42:48.903219 ignition[604]: Stage: fetch-offline May 15 10:42:48.903388 ignition[604]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 15 10:42:48.903549 ignition[604]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed May 15 10:42:48.903669 systemd[1]: Finished dracut-pre-mount.service. May 15 10:42:48.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:48.906802 ignition[604]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" May 15 10:42:48.907026 ignition[604]: parsed url from cmdline: "" May 15 10:42:48.907068 ignition[604]: no config URL provided May 15 10:42:48.907185 ignition[604]: reading system config file "/usr/lib/ignition/user.ign" May 15 10:42:48.907333 ignition[604]: no config at "/usr/lib/ignition/user.ign" May 15 10:42:48.911687 ignition[604]: config successfully fetched May 15 10:42:48.911741 ignition[604]: parsing config with SHA512: d8820002f0c8a696105afbd7a0413347ec4e206ad8e60c411e9bcf43caa27039c0711c19aeb89a2f6ce99830370a00670e6ec219d812dff68cdadba746d5b819 May 15 10:42:48.917060 unknown[604]: fetched base config from "system" May 15 10:42:48.917230 unknown[604]: fetched user config from "vmware" May 15 10:42:48.917630 ignition[604]: fetch-offline: fetch-offline passed May 15 10:42:48.917804 ignition[604]: Ignition finished successfully May 15 10:42:48.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:48.918447 systemd[1]: Finished ignition-fetch-offline.service. May 15 10:42:48.918594 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 15 10:42:48.919048 systemd[1]: Starting ignition-kargs.service... May 15 10:42:48.924354 ignition[752]: Ignition 2.14.0 May 15 10:42:48.924361 ignition[752]: Stage: kargs May 15 10:42:48.924427 ignition[752]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 15 10:42:48.924438 ignition[752]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed May 15 10:42:48.925691 ignition[752]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" May 15 10:42:48.927022 ignition[752]: kargs: kargs passed May 15 10:42:48.927069 ignition[752]: Ignition finished successfully May 15 10:42:48.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:48.928444 systemd[1]: Finished ignition-kargs.service. May 15 10:42:48.929282 systemd[1]: Starting ignition-disks.service... May 15 10:42:48.933905 ignition[758]: Ignition 2.14.0 May 15 10:42:48.934164 ignition[758]: Stage: disks May 15 10:42:48.934367 ignition[758]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 15 10:42:48.934524 ignition[758]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed May 15 10:42:48.935877 ignition[758]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" May 15 10:42:48.937905 ignition[758]: disks: disks passed May 15 10:42:48.938063 ignition[758]: Ignition finished successfully May 15 10:42:48.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:48.938647 systemd[1]: Finished ignition-disks.service. May 15 10:42:48.938804 systemd[1]: Reached target initrd-root-device.target. May 15 10:42:48.938900 systemd[1]: Reached target local-fs-pre.target. May 15 10:42:48.938987 systemd[1]: Reached target local-fs.target. May 15 10:42:48.939070 systemd[1]: Reached target sysinit.target. May 15 10:42:48.939150 systemd[1]: Reached target basic.target. May 15 10:42:48.939797 systemd[1]: Starting systemd-fsck-root.service... May 15 10:42:48.951495 systemd-fsck[766]: ROOT: clean, 623/1628000 files, 124060/1617920 blocks May 15 10:42:48.953483 systemd[1]: Finished systemd-fsck-root.service. May 15 10:42:48.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:48.954232 systemd[1]: Mounting sysroot.mount... May 15 10:42:49.189219 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 15 10:42:49.189967 systemd[1]: Mounted sysroot.mount. May 15 10:42:49.190162 systemd[1]: Reached target initrd-root-fs.target. May 15 10:42:49.200027 systemd[1]: Mounting sysroot-usr.mount... May 15 10:42:49.200539 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 15 10:42:49.200570 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 15 10:42:49.200595 systemd[1]: Reached target ignition-diskful.target. May 15 10:42:49.202461 systemd[1]: Mounted sysroot-usr.mount. May 15 10:42:49.203286 systemd[1]: Starting initrd-setup-root.service... May 15 10:42:49.206873 initrd-setup-root[776]: cut: /sysroot/etc/passwd: No such file or directory May 15 10:42:49.211156 initrd-setup-root[784]: cut: /sysroot/etc/group: No such file or directory May 15 10:42:49.214285 initrd-setup-root[792]: cut: /sysroot/etc/shadow: No such file or directory May 15 10:42:49.216988 initrd-setup-root[800]: cut: /sysroot/etc/gshadow: No such file or directory May 15 10:42:49.246816 systemd[1]: Finished initrd-setup-root.service. May 15 10:42:49.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:49.247399 systemd[1]: Starting ignition-mount.service... May 15 10:42:49.247870 systemd[1]: Starting sysroot-boot.service... May 15 10:42:49.251553 bash[817]: umount: /sysroot/usr/share/oem: not mounted. May 15 10:42:49.256322 ignition[818]: INFO : Ignition 2.14.0 May 15 10:42:49.256322 ignition[818]: INFO : Stage: mount May 15 10:42:49.256620 ignition[818]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 15 10:42:49.256620 ignition[818]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed May 15 10:42:49.257693 ignition[818]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" May 15 10:42:49.259122 ignition[818]: INFO : mount: mount passed May 15 10:42:49.259122 ignition[818]: INFO : Ignition finished successfully May 15 10:42:49.259781 systemd[1]: Finished ignition-mount.service. May 15 10:42:49.258000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:49.267147 systemd[1]: Finished sysroot-boot.service. May 15 10:42:49.266000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:49.664417 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 15 10:42:49.672216 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (827) May 15 10:42:49.674298 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm May 15 10:42:49.674317 kernel: BTRFS info (device sda6): using free space tree May 15 10:42:49.674331 kernel: BTRFS info (device sda6): has skinny extents May 15 10:42:49.678214 kernel: BTRFS info (device sda6): enabling ssd optimizations May 15 10:42:49.680213 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 15 10:42:49.680963 systemd[1]: Starting ignition-files.service... May 15 10:42:49.691011 ignition[847]: INFO : Ignition 2.14.0 May 15 10:42:49.691011 ignition[847]: INFO : Stage: files May 15 10:42:49.691444 ignition[847]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 15 10:42:49.691444 ignition[847]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed May 15 10:42:49.692333 ignition[847]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" May 15 10:42:49.698091 ignition[847]: DEBUG : files: compiled without relabeling support, skipping May 15 10:42:49.698952 ignition[847]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 15 10:42:49.698952 ignition[847]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 15 10:42:49.701160 ignition[847]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 15 10:42:49.701352 ignition[847]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 15 10:42:49.701958 unknown[847]: wrote ssh authorized keys file for user: core May 15 10:42:49.702229 ignition[847]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 15 10:42:49.702434 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" May 15 10:42:49.702640 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" May 15 10:42:49.702848 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" May 15 10:42:49.702848 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 15 10:42:49.702848 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 15 10:42:49.702848 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 15 10:42:49.703799 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" May 15 10:42:49.703799 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(6): oem config not found in "/usr/share/oem", looking on oem partition May 15 10:42:49.707227 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3348638815" May 15 10:42:49.707227 ignition[847]: CRITICAL : files: createFilesystemsFiles: createFiles: op(6): op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3348638815": device or resource busy May 15 10:42:49.707227 ignition[847]: ERROR : files: createFilesystemsFiles: createFiles: op(6): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3348638815", trying btrfs: device or resource busy May 15 10:42:49.707227 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3348638815" May 15 10:42:49.709547 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3348638815" May 15 10:42:49.709547 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [started] unmounting "/mnt/oem3348638815" May 15 10:42:49.710095 systemd[1]: mnt-oem3348638815.mount: Deactivated successfully. May 15 10:42:49.710357 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [finished] unmounting "/mnt/oem3348638815" May 15 10:42:49.710579 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" May 15 10:42:49.710579 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 15 10:42:49.710579 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.32.0-x86-64.raw: attempt #1 May 15 10:42:50.591517 systemd-networkd[733]: ens192: Gained IPv6LL May 15 10:42:55.246387 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK May 15 10:42:55.470752 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 15 10:42:55.471023 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/systemd/network/00-vmware.network" May 15 10:42:55.471194 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/systemd/network/00-vmware.network" May 15 10:42:55.471194 ignition[847]: INFO : files: op(c): [started] processing unit "vmtoolsd.service" May 15 10:42:55.471194 ignition[847]: INFO : files: op(c): [finished] processing unit "vmtoolsd.service" May 15 10:42:55.471194 ignition[847]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" May 15 10:42:55.471194 ignition[847]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 15 10:42:55.471194 ignition[847]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 15 10:42:55.471194 ignition[847]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" May 15 10:42:55.471194 ignition[847]: INFO : files: op(f): [started] setting preset to enabled for "vmtoolsd.service" May 15 10:42:55.472348 ignition[847]: INFO : files: op(f): [finished] setting preset to enabled for "vmtoolsd.service" May 15 10:42:55.472348 ignition[847]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" May 15 10:42:55.472348 ignition[847]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" May 15 10:42:55.520810 ignition[847]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 15 10:42:55.521025 ignition[847]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" May 15 10:42:55.521025 ignition[847]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" May 15 10:42:55.521025 ignition[847]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" May 15 10:42:55.521025 ignition[847]: INFO : files: files passed May 15 10:42:55.521025 ignition[847]: INFO : Ignition finished successfully May 15 10:42:55.527277 kernel: kauditd_printk_skb: 24 callbacks suppressed May 15 10:42:55.527293 kernel: audit: type=1130 audit(1747305775.520:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:55.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:55.521609 systemd[1]: Finished ignition-files.service. May 15 10:42:55.523036 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 15 10:42:55.526646 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 15 10:42:55.527479 systemd[1]: Starting ignition-quench.service... May 15 10:42:55.529227 initrd-setup-root-after-ignition[873]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 15 10:42:55.529355 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 15 10:42:55.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:55.529634 systemd[1]: ignition-quench.service: Deactivated successfully. May 15 10:42:55.532336 kernel: audit: type=1130 audit(1747305775.528:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:55.529673 systemd[1]: Finished ignition-quench.service. May 15 10:42:55.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:55.532529 systemd[1]: Reached target ignition-complete.target. May 15 10:42:55.537269 kernel: audit: type=1130 audit(1747305775.531:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:55.537284 kernel: audit: type=1131 audit(1747305775.531:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:55.531000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:55.537865 systemd[1]: Starting initrd-parse-etc.service... May 15 10:42:55.546403 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 15 10:42:55.546633 systemd[1]: Finished initrd-parse-etc.service. May 15 10:42:55.545000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:55.546983 systemd[1]: Reached target initrd-fs.target. May 15 10:42:55.551765 kernel: audit: type=1130 audit(1747305775.545:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:55.551782 kernel: audit: type=1131 audit(1747305775.545:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:55.545000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:55.551949 systemd[1]: Reached target initrd.target. May 15 10:42:55.552195 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 15 10:42:55.552891 systemd[1]: Starting dracut-pre-pivot.service... May 15 10:42:55.560414 systemd[1]: Finished dracut-pre-pivot.service. May 15 10:42:55.559000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:55.561216 systemd[1]: Starting initrd-cleanup.service... May 15 10:42:55.563361 kernel: audit: type=1130 audit(1747305775.559:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:55.568749 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 15 10:42:55.568816 systemd[1]: Finished initrd-cleanup.service. May 15 10:42:55.567000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:55.569469 systemd[1]: Stopped target nss-lookup.target. May 15 10:42:55.573953 kernel: audit: type=1130 audit(1747305775.567:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:55.573970 kernel: audit: type=1131 audit(1747305775.567:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:55.567000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:55.573860 systemd[1]: Stopped target remote-cryptsetup.target. May 15 10:42:55.574024 systemd[1]: Stopped target timers.target. May 15 10:42:55.574291 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 15 10:42:55.574327 systemd[1]: Stopped dracut-pre-pivot.service. May 15 10:42:55.576976 kernel: audit: type=1131 audit(1747305775.573:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:55.573000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:55.574536 systemd[1]: Stopped target initrd.target. May 15 10:42:55.577030 systemd[1]: Stopped target basic.target. May 15 10:42:55.577210 systemd[1]: Stopped target ignition-complete.target. May 15 10:42:55.577372 systemd[1]: Stopped target ignition-diskful.target. May 15 10:42:55.577532 systemd[1]: Stopped target initrd-root-device.target. May 15 10:42:55.577703 systemd[1]: Stopped target remote-fs.target. May 15 10:42:55.577868 systemd[1]: Stopped target remote-fs-pre.target. May 15 10:42:55.578047 systemd[1]: Stopped target sysinit.target. May 15 10:42:55.578189 systemd[1]: Stopped target local-fs.target. May 15 10:42:55.578343 systemd[1]: Stopped target local-fs-pre.target. May 15 10:42:55.578500 systemd[1]: Stopped target swap.target. May 15 10:42:55.578662 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 15 10:42:55.577000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:55.578702 systemd[1]: Stopped dracut-pre-mount.service. May 15 10:42:55.578856 systemd[1]: Stopped target cryptsetup.target. May 15 10:42:55.577000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:55.578995 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 15 10:42:55.578000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:55.579020 systemd[1]: Stopped dracut-initqueue.service. May 15 10:42:55.579186 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 15 10:42:55.579217 systemd[1]: Stopped ignition-fetch-offline.service. May 15 10:42:55.579335 systemd[1]: Stopped target paths.target. May 15 10:42:55.579479 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 15 10:42:55.583223 systemd[1]: Stopped systemd-ask-password-console.path. May 15 10:42:55.583337 systemd[1]: Stopped target slices.target. May 15 10:42:55.583505 systemd[1]: Stopped target sockets.target. May 15 10:42:55.583681 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 15 10:42:55.582000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:55.583707 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 15 10:42:55.582000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:55.583842 systemd[1]: ignition-files.service: Deactivated successfully. May 15 10:42:55.583861 systemd[1]: Stopped ignition-files.service. May 15 10:42:55.584000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:55.584000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:55.584455 systemd[1]: Stopping ignition-mount.service... May 15 10:42:55.587445 iscsid[738]: iscsid shutting down. May 15 10:42:55.584620 systemd[1]: Stopping iscsid.service... May 15 10:42:55.585015 systemd[1]: Stopping sysroot-boot.service... May 15 10:42:55.585121 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 15 10:42:55.585152 systemd[1]: Stopped systemd-udev-trigger.service. May 15 10:42:55.585291 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 15 10:42:55.585310 systemd[1]: Stopped dracut-pre-trigger.service. May 15 10:42:55.588566 systemd[1]: iscsid.service: Deactivated successfully. May 15 10:42:55.588762 systemd[1]: Stopped iscsid.service. May 15 10:42:55.587000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:55.589073 systemd[1]: iscsid.socket: Deactivated successfully. May 15 10:42:55.589232 systemd[1]: Closed iscsid.socket. May 15 10:42:55.589462 systemd[1]: Stopping iscsiuio.service... May 15 10:42:55.590887 systemd[1]: iscsiuio.service: Deactivated successfully. May 15 10:42:55.591164 systemd[1]: Stopped iscsiuio.service. May 15 10:42:55.590000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:55.591502 systemd[1]: iscsiuio.socket: Deactivated successfully. May 15 10:42:55.591647 systemd[1]: Closed iscsiuio.socket. May 15 10:42:55.591845 ignition[886]: INFO : Ignition 2.14.0 May 15 10:42:55.591845 ignition[886]: INFO : Stage: umount May 15 10:42:55.592119 ignition[886]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 15 10:42:55.592119 ignition[886]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed May 15 10:42:55.594906 ignition[886]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" May 15 10:42:55.599067 ignition[886]: INFO : umount: umount passed May 15 10:42:55.599293 ignition[886]: INFO : Ignition finished successfully May 15 10:42:55.600163 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 15 10:42:55.600589 systemd[1]: ignition-mount.service: Deactivated successfully. May 15 10:42:55.600803 systemd[1]: Stopped ignition-mount.service. May 15 10:42:55.599000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:55.601115 systemd[1]: Stopped target network.target. May 15 10:42:55.601323 systemd[1]: ignition-disks.service: Deactivated successfully. May 15 10:42:55.601472 systemd[1]: Stopped ignition-disks.service. May 15 10:42:55.600000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:55.601721 systemd[1]: ignition-kargs.service: Deactivated successfully. May 15 10:42:55.601875 systemd[1]: Stopped ignition-kargs.service. May 15 10:42:55.600000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:55.602122 systemd[1]: ignition-setup.service: Deactivated successfully. May 15 10:42:55.602424 systemd[1]: Stopped ignition-setup.service. May 15 10:42:55.601000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:55.602735 systemd[1]: Stopping systemd-networkd.service... May 15 10:42:55.603029 systemd[1]: Stopping systemd-resolved.service... May 15 10:42:55.605889 systemd[1]: systemd-networkd.service: Deactivated successfully. May 15 10:42:55.606095 systemd[1]: Stopped systemd-networkd.service. May 15 10:42:55.605000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:55.606660 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 15 10:42:55.606813 systemd[1]: Closed systemd-networkd.socket. May 15 10:42:55.608103 systemd[1]: Stopping network-cleanup.service... May 15 10:42:55.608540 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 15 10:42:55.608720 systemd[1]: Stopped parse-ip-for-networkd.service. May 15 10:42:55.607000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:55.609039 systemd[1]: afterburn-network-kargs.service: Deactivated successfully. May 15 10:42:55.608000 audit: BPF prog-id=9 op=UNLOAD May 15 10:42:55.609297 systemd[1]: Stopped afterburn-network-kargs.service. May 15 10:42:55.608000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:55.610078 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 15 10:42:55.610381 systemd[1]: Stopped systemd-sysctl.service. May 15 10:42:55.609000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:55.610758 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 15 10:42:55.610916 systemd[1]: Stopped systemd-modules-load.service. May 15 10:42:55.609000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:55.611271 systemd[1]: Stopping systemd-udevd.service... May 15 10:42:55.612083 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 15 10:42:55.612513 systemd[1]: systemd-resolved.service: Deactivated successfully. May 15 10:42:55.612701 systemd[1]: Stopped systemd-resolved.service. May 15 10:42:55.611000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:55.614157 systemd[1]: systemd-udevd.service: Deactivated successfully. May 15 10:42:55.614419 systemd[1]: Stopped systemd-udevd.service. May 15 10:42:55.613000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:55.614747 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 15 10:42:55.615054 systemd[1]: Closed systemd-udevd-control.socket. May 15 10:42:55.615803 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 15 10:42:55.615959 systemd[1]: Closed systemd-udevd-kernel.socket. May 15 10:42:55.616186 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 15 10:42:55.615000 audit: BPF prog-id=6 op=UNLOAD May 15 10:42:55.616539 systemd[1]: Stopped dracut-pre-udev.service. May 15 10:42:55.615000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:55.616806 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 15 10:42:55.616954 systemd[1]: Stopped dracut-cmdline.service. May 15 10:42:55.615000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:55.617215 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 15 10:42:55.617366 systemd[1]: Stopped dracut-cmdline-ask.service. May 15 10:42:55.616000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:55.618004 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 15 10:42:55.618304 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. May 15 10:42:55.618472 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. May 15 10:42:55.617000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:55.618821 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 15 10:42:55.618977 systemd[1]: Stopped kmod-static-nodes.service. May 15 10:42:55.617000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:55.619248 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 15 10:42:55.619403 systemd[1]: Stopped systemd-vconsole-setup.service. May 15 10:42:55.618000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:55.620304 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. May 15 10:42:55.621276 systemd[1]: network-cleanup.service: Deactivated successfully. May 15 10:42:55.621466 systemd[1]: Stopped network-cleanup.service. May 15 10:42:55.620000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:55.621827 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 15 10:42:55.622012 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 15 10:42:55.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:55.621000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:55.704094 systemd[1]: sysroot-boot.service: Deactivated successfully. May 15 10:42:55.704347 systemd[1]: Stopped sysroot-boot.service. May 15 10:42:55.703000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:55.704813 systemd[1]: Reached target initrd-switch-root.target. May 15 10:42:55.705032 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 15 10:42:55.705184 systemd[1]: Stopped initrd-setup-root.service. May 15 10:42:55.704000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:55.705859 systemd[1]: Starting initrd-switch-root.service... May 15 10:42:55.712976 systemd[1]: Switching root. May 15 10:42:55.731334 systemd-journald[217]: Journal stopped May 15 10:42:58.132810 systemd-journald[217]: Received SIGTERM from PID 1 (systemd). May 15 10:42:58.132828 kernel: SELinux: Class mctp_socket not defined in policy. May 15 10:42:58.132837 kernel: SELinux: Class anon_inode not defined in policy. May 15 10:42:58.132843 kernel: SELinux: the above unknown classes and permissions will be allowed May 15 10:42:58.132849 kernel: SELinux: policy capability network_peer_controls=1 May 15 10:42:58.132855 kernel: SELinux: policy capability open_perms=1 May 15 10:42:58.132862 kernel: SELinux: policy capability extended_socket_class=1 May 15 10:42:58.132867 kernel: SELinux: policy capability always_check_network=0 May 15 10:42:58.132873 kernel: SELinux: policy capability cgroup_seclabel=1 May 15 10:42:58.132878 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 15 10:42:58.132884 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 15 10:42:58.132889 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 15 10:42:58.132896 systemd[1]: Successfully loaded SELinux policy in 37.793ms. May 15 10:42:58.132903 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 5.597ms. May 15 10:42:58.132912 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 15 10:42:58.132919 systemd[1]: Detected virtualization vmware. May 15 10:42:58.132926 systemd[1]: Detected architecture x86-64. May 15 10:42:58.132932 systemd[1]: Detected first boot. May 15 10:42:58.132939 systemd[1]: Initializing machine ID from random generator. May 15 10:42:58.132945 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 15 10:42:58.132951 systemd[1]: Populated /etc with preset unit settings. May 15 10:42:58.132958 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 10:42:58.132964 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 10:42:58.132972 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 10:42:58.132980 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 15 10:42:58.132987 systemd[1]: Stopped initrd-switch-root.service. May 15 10:42:58.132993 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 15 10:42:58.133000 systemd[1]: Created slice system-addon\x2dconfig.slice. May 15 10:42:58.133006 systemd[1]: Created slice system-addon\x2drun.slice. May 15 10:42:58.133013 systemd[1]: Created slice system-getty.slice. May 15 10:42:58.133019 systemd[1]: Created slice system-modprobe.slice. May 15 10:42:58.133026 systemd[1]: Created slice system-serial\x2dgetty.slice. May 15 10:42:58.133033 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 15 10:42:58.133040 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 15 10:42:58.133046 systemd[1]: Created slice user.slice. May 15 10:42:58.133052 systemd[1]: Started systemd-ask-password-console.path. May 15 10:42:58.133059 systemd[1]: Started systemd-ask-password-wall.path. May 15 10:42:58.133065 systemd[1]: Set up automount boot.automount. May 15 10:42:58.133071 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 15 10:42:58.133079 systemd[1]: Stopped target initrd-switch-root.target. May 15 10:42:58.133116 systemd[1]: Stopped target initrd-fs.target. May 15 10:42:58.133127 systemd[1]: Stopped target initrd-root-fs.target. May 15 10:42:58.133133 systemd[1]: Reached target integritysetup.target. May 15 10:42:58.133148 systemd[1]: Reached target remote-cryptsetup.target. May 15 10:42:58.133155 systemd[1]: Reached target remote-fs.target. May 15 10:42:58.133162 systemd[1]: Reached target slices.target. May 15 10:42:58.133169 systemd[1]: Reached target swap.target. May 15 10:42:58.133175 systemd[1]: Reached target torcx.target. May 15 10:42:58.133184 systemd[1]: Reached target veritysetup.target. May 15 10:42:58.133190 systemd[1]: Listening on systemd-coredump.socket. May 15 10:42:58.133211 systemd[1]: Listening on systemd-initctl.socket. May 15 10:42:58.133220 systemd[1]: Listening on systemd-networkd.socket. May 15 10:42:58.133227 systemd[1]: Listening on systemd-udevd-control.socket. May 15 10:42:58.133234 systemd[1]: Listening on systemd-udevd-kernel.socket. May 15 10:42:58.133244 systemd[1]: Listening on systemd-userdbd.socket. May 15 10:42:58.133250 systemd[1]: Mounting dev-hugepages.mount... May 15 10:42:58.133257 systemd[1]: Mounting dev-mqueue.mount... May 15 10:42:58.133264 systemd[1]: Mounting media.mount... May 15 10:42:58.133271 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:42:58.133277 systemd[1]: Mounting sys-kernel-debug.mount... May 15 10:42:58.133284 systemd[1]: Mounting sys-kernel-tracing.mount... May 15 10:42:58.133292 systemd[1]: Mounting tmp.mount... May 15 10:42:58.133299 systemd[1]: Starting flatcar-tmpfiles.service... May 15 10:42:58.133306 systemd[1]: Starting ignition-delete-config.service... May 15 10:42:58.133313 systemd[1]: Starting kmod-static-nodes.service... May 15 10:42:58.133319 systemd[1]: Starting modprobe@configfs.service... May 15 10:42:58.133326 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:42:58.133333 systemd[1]: Starting modprobe@drm.service... May 15 10:42:58.133340 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:42:58.133347 systemd[1]: Starting modprobe@fuse.service... May 15 10:42:58.133355 systemd[1]: Starting modprobe@loop.service... May 15 10:42:58.133362 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 15 10:42:58.133369 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 15 10:42:58.133376 systemd[1]: Stopped systemd-fsck-root.service. May 15 10:42:58.133382 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 15 10:42:58.133389 systemd[1]: Stopped systemd-fsck-usr.service. May 15 10:42:58.133396 systemd[1]: Stopped systemd-journald.service. May 15 10:42:58.133404 systemd[1]: Starting systemd-journald.service... May 15 10:42:58.133410 systemd[1]: Starting systemd-modules-load.service... May 15 10:42:58.133418 systemd[1]: Starting systemd-network-generator.service... May 15 10:42:58.133425 systemd[1]: Starting systemd-remount-fs.service... May 15 10:42:58.133432 systemd[1]: Starting systemd-udev-trigger.service... May 15 10:42:58.133439 systemd[1]: verity-setup.service: Deactivated successfully. May 15 10:42:58.133445 systemd[1]: Stopped verity-setup.service. May 15 10:42:58.133452 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:42:58.133459 kernel: fuse: init (API version 7.34) May 15 10:42:58.133465 systemd[1]: Mounted dev-hugepages.mount. May 15 10:42:58.133472 systemd[1]: Mounted dev-mqueue.mount. May 15 10:42:58.133480 systemd[1]: Mounted media.mount. May 15 10:42:58.133487 systemd[1]: Mounted sys-kernel-debug.mount. May 15 10:42:58.133494 systemd[1]: Mounted sys-kernel-tracing.mount. May 15 10:42:58.133501 systemd[1]: Mounted tmp.mount. May 15 10:42:58.133507 systemd[1]: Finished kmod-static-nodes.service. May 15 10:42:58.133514 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 15 10:42:58.133521 systemd[1]: Finished modprobe@configfs.service. May 15 10:42:58.133528 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:42:58.133535 kernel: loop: module loaded May 15 10:42:58.133542 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:42:58.133549 systemd[1]: modprobe@drm.service: Deactivated successfully. May 15 10:42:58.133556 systemd[1]: Finished modprobe@drm.service. May 15 10:42:58.133563 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:42:58.133569 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:42:58.133576 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 15 10:42:58.133583 systemd[1]: Finished modprobe@fuse.service. May 15 10:42:58.133590 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:42:58.133598 systemd[1]: Finished modprobe@loop.service. May 15 10:42:58.133605 systemd[1]: Finished systemd-network-generator.service. May 15 10:42:58.133611 systemd[1]: Finished systemd-remount-fs.service. May 15 10:42:58.133618 systemd[1]: Reached target network-pre.target. May 15 10:42:58.133625 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 15 10:42:58.133631 systemd[1]: Mounting sys-kernel-config.mount... May 15 10:42:58.133638 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 15 10:42:58.133650 systemd-journald[1005]: Journal started May 15 10:42:58.133679 systemd-journald[1005]: Runtime Journal (/run/log/journal/f99cac89dfe746959caa3be89b89f397) is 4.8M, max 38.8M, 34.0M free. May 15 10:42:55.877000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 15 10:42:55.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 15 10:42:55.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 15 10:42:55.915000 audit: BPF prog-id=10 op=LOAD May 15 10:42:55.915000 audit: BPF prog-id=10 op=UNLOAD May 15 10:42:55.915000 audit: BPF prog-id=11 op=LOAD May 15 10:42:55.915000 audit: BPF prog-id=11 op=UNLOAD May 15 10:42:55.995000 audit[920]: AVC avc: denied { associate } for pid=920 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 15 10:42:55.995000 audit[920]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a2 a1=c0000cede0 a2=c0000d7040 a3=32 items=0 ppid=903 pid=920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:42:55.995000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 15 10:42:55.996000 audit[920]: AVC avc: denied { associate } for pid=920 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 15 10:42:55.996000 audit[920]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d979 a2=1ed a3=0 items=2 ppid=903 pid=920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:42:55.996000 audit: CWD cwd="/" May 15 10:42:55.996000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:55.996000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:55.996000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 15 10:42:58.000000 audit: BPF prog-id=12 op=LOAD May 15 10:42:58.000000 audit: BPF prog-id=3 op=UNLOAD May 15 10:42:58.000000 audit: BPF prog-id=13 op=LOAD May 15 10:42:58.000000 audit: BPF prog-id=14 op=LOAD May 15 10:42:58.000000 audit: BPF prog-id=4 op=UNLOAD May 15 10:42:58.000000 audit: BPF prog-id=5 op=UNLOAD May 15 10:42:58.000000 audit: BPF prog-id=15 op=LOAD May 15 10:42:58.000000 audit: BPF prog-id=12 op=UNLOAD May 15 10:42:58.000000 audit: BPF prog-id=16 op=LOAD May 15 10:42:58.000000 audit: BPF prog-id=17 op=LOAD May 15 10:42:58.000000 audit: BPF prog-id=13 op=UNLOAD May 15 10:42:58.000000 audit: BPF prog-id=14 op=UNLOAD May 15 10:42:58.002000 audit: BPF prog-id=18 op=LOAD May 15 10:42:58.002000 audit: BPF prog-id=15 op=UNLOAD May 15 10:42:58.002000 audit: BPF prog-id=19 op=LOAD May 15 10:42:58.002000 audit: BPF prog-id=20 op=LOAD May 15 10:42:58.002000 audit: BPF prog-id=16 op=UNLOAD May 15 10:42:58.002000 audit: BPF prog-id=17 op=UNLOAD May 15 10:42:58.002000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:58.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:58.004000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:58.011000 audit: BPF prog-id=18 op=UNLOAD May 15 10:42:58.066000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:58.067000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:58.069000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:58.069000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:58.070000 audit: BPF prog-id=21 op=LOAD May 15 10:42:58.070000 audit: BPF prog-id=22 op=LOAD May 15 10:42:58.070000 audit: BPF prog-id=23 op=LOAD May 15 10:42:58.070000 audit: BPF prog-id=19 op=UNLOAD May 15 10:42:58.070000 audit: BPF prog-id=20 op=UNLOAD May 15 10:42:58.082000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:58.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:58.097000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:58.097000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:58.100000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:58.100000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:58.102000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:58.102000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:58.106000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:58.106000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:58.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:58.108000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:58.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:58.110000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:58.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:58.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:58.130000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 15 10:42:58.130000 audit[1005]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7ffc7c5312e0 a2=4000 a3=7ffc7c53137c items=0 ppid=1 pid=1005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:42:58.130000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 15 10:42:55.994778 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-05-15T10:42:55Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 10:42:58.000119 systemd[1]: Queued start job for default target multi-user.target. May 15 10:42:55.995226 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-05-15T10:42:55Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 15 10:42:58.000126 systemd[1]: Unnecessary job was removed for dev-sda6.device. May 15 10:42:55.995237 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-05-15T10:42:55Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 15 10:42:58.003608 systemd[1]: systemd-journald.service: Deactivated successfully. May 15 10:42:55.995257 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-05-15T10:42:55Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 15 10:42:55.995263 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-05-15T10:42:55Z" level=debug msg="skipped missing lower profile" missing profile=oem May 15 10:42:55.995283 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-05-15T10:42:55Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 15 10:42:55.995291 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-05-15T10:42:55Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 15 10:42:55.995451 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-05-15T10:42:55Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 15 10:42:55.995475 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-05-15T10:42:55Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 15 10:42:58.135420 jq[987]: true May 15 10:42:55.995483 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-05-15T10:42:55Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 15 10:42:55.996083 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-05-15T10:42:55Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 15 10:42:55.996104 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-05-15T10:42:55Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 15 10:42:55.996114 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-05-15T10:42:55Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.100: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.100 May 15 10:42:55.996123 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-05-15T10:42:55Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 15 10:42:55.996132 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-05-15T10:42:55Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.100: no such file or directory" path=/var/lib/torcx/store/3510.3.100 May 15 10:42:55.996140 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-05-15T10:42:55Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 15 10:42:57.803602 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-05-15T10:42:57Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 10:42:57.803756 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-05-15T10:42:57Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 10:42:57.803825 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-05-15T10:42:57Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 10:42:57.803933 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-05-15T10:42:57Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 10:42:57.803967 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-05-15T10:42:57Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 15 10:42:58.136093 jq[1017]: true May 15 10:42:57.804008 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2025-05-15T10:42:57Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 15 10:42:58.145386 systemd[1]: Starting systemd-hwdb-update.service... May 15 10:42:58.145424 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 10:42:58.145435 systemd[1]: Starting systemd-random-seed.service... May 15 10:42:58.145447 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 10:42:58.146953 systemd[1]: Started systemd-journald.service. May 15 10:42:58.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:58.147724 systemd[1]: Finished flatcar-tmpfiles.service. May 15 10:42:58.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:58.147926 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 15 10:42:58.148120 systemd[1]: Mounted sys-kernel-config.mount. May 15 10:42:58.149276 systemd[1]: Starting systemd-journal-flush.service... May 15 10:42:58.150870 systemd[1]: Starting systemd-sysusers.service... May 15 10:42:58.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:58.154095 systemd[1]: Finished systemd-modules-load.service. May 15 10:42:58.155024 systemd[1]: Starting systemd-sysctl.service... May 15 10:42:58.159845 systemd-journald[1005]: Time spent on flushing to /var/log/journal/f99cac89dfe746959caa3be89b89f397 is 37.356ms for 1991 entries. May 15 10:42:58.159845 systemd-journald[1005]: System Journal (/var/log/journal/f99cac89dfe746959caa3be89b89f397) is 8.0M, max 584.8M, 576.8M free. May 15 10:42:58.204636 systemd-journald[1005]: Received client request to flush runtime journal. May 15 10:42:58.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:58.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:58.201000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:58.165466 systemd[1]: Finished systemd-random-seed.service. May 15 10:42:58.165637 systemd[1]: Reached target first-boot-complete.target. May 15 10:42:58.174259 systemd[1]: Finished systemd-sysctl.service. May 15 10:42:58.202436 systemd[1]: Finished systemd-sysusers.service. May 15 10:42:58.203560 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 15 10:42:58.212000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:58.213275 systemd[1]: Finished systemd-journal-flush.service. May 15 10:42:58.257492 systemd[1]: Finished systemd-udev-trigger.service. May 15 10:42:58.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:58.258574 systemd[1]: Starting systemd-udev-settle.service... May 15 10:42:58.265141 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 15 10:42:58.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:58.269075 udevadm[1054]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. May 15 10:42:58.279502 ignition[1030]: Ignition 2.14.0 May 15 10:42:58.279704 ignition[1030]: deleting config from guestinfo properties May 15 10:42:58.283487 ignition[1030]: Successfully deleted config May 15 10:42:58.284437 systemd[1]: Finished ignition-delete-config.service. May 15 10:42:58.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ignition-delete-config comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:58.627478 systemd[1]: Finished systemd-hwdb-update.service. May 15 10:42:58.626000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:58.627000 audit: BPF prog-id=24 op=LOAD May 15 10:42:58.627000 audit: BPF prog-id=25 op=LOAD May 15 10:42:58.627000 audit: BPF prog-id=7 op=UNLOAD May 15 10:42:58.627000 audit: BPF prog-id=8 op=UNLOAD May 15 10:42:58.628764 systemd[1]: Starting systemd-udevd.service... May 15 10:42:58.640985 systemd-udevd[1055]: Using default interface naming scheme 'v252'. May 15 10:42:58.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:58.661000 audit: BPF prog-id=26 op=LOAD May 15 10:42:58.661348 systemd[1]: Started systemd-udevd.service. May 15 10:42:58.662643 systemd[1]: Starting systemd-networkd.service... May 15 10:42:58.671000 audit: BPF prog-id=27 op=LOAD May 15 10:42:58.672000 audit: BPF prog-id=28 op=LOAD May 15 10:42:58.672000 audit: BPF prog-id=29 op=LOAD May 15 10:42:58.673654 systemd[1]: Starting systemd-userdbd.service... May 15 10:42:58.688854 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 15 10:42:58.704000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:58.705696 systemd[1]: Started systemd-userdbd.service. May 15 10:42:58.719216 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 15 10:42:58.736224 kernel: ACPI: button: Power Button [PWRF] May 15 10:42:58.774000 audit[1066]: AVC avc: denied { confidentiality } for pid=1066 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 15 10:42:58.774000 audit[1066]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55cb97d65b50 a1=338ac a2=7f7897341bc5 a3=5 items=110 ppid=1055 pid=1066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:42:58.774000 audit: CWD cwd="/" May 15 10:42:58.774000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=1 name=(null) inode=16264 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=2 name=(null) inode=16264 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=3 name=(null) inode=16265 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=4 name=(null) inode=16264 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=5 name=(null) inode=16266 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=6 name=(null) inode=16264 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=7 name=(null) inode=16267 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=8 name=(null) inode=16267 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=9 name=(null) inode=16268 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=10 name=(null) inode=16267 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=11 name=(null) inode=16269 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=12 name=(null) inode=16267 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=13 name=(null) inode=16270 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=14 name=(null) inode=16267 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=15 name=(null) inode=16271 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=16 name=(null) inode=16267 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=17 name=(null) inode=16272 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=18 name=(null) inode=16264 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=19 name=(null) inode=16273 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=20 name=(null) inode=16273 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=21 name=(null) inode=16274 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=22 name=(null) inode=16273 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=23 name=(null) inode=16275 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=24 name=(null) inode=16273 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=25 name=(null) inode=16276 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=26 name=(null) inode=16273 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=27 name=(null) inode=16277 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=28 name=(null) inode=16273 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=29 name=(null) inode=16278 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=30 name=(null) inode=16264 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=31 name=(null) inode=16279 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=32 name=(null) inode=16279 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=33 name=(null) inode=16280 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=34 name=(null) inode=16279 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=35 name=(null) inode=16281 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=36 name=(null) inode=16279 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=37 name=(null) inode=16282 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=38 name=(null) inode=16279 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=39 name=(null) inode=16283 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=40 name=(null) inode=16279 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=41 name=(null) inode=16284 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=42 name=(null) inode=16264 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=43 name=(null) inode=16285 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=44 name=(null) inode=16285 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=45 name=(null) inode=16286 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=46 name=(null) inode=16285 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=47 name=(null) inode=16287 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=48 name=(null) inode=16285 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=49 name=(null) inode=16288 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=50 name=(null) inode=16285 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=51 name=(null) inode=16289 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=52 name=(null) inode=16285 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=53 name=(null) inode=16290 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=55 name=(null) inode=16291 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=56 name=(null) inode=16291 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=57 name=(null) inode=16292 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=58 name=(null) inode=16291 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=59 name=(null) inode=16293 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=60 name=(null) inode=16291 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=61 name=(null) inode=16294 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=62 name=(null) inode=16294 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=63 name=(null) inode=16295 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=64 name=(null) inode=16294 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=65 name=(null) inode=16296 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=66 name=(null) inode=16294 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=67 name=(null) inode=16297 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=68 name=(null) inode=16294 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=69 name=(null) inode=16298 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=70 name=(null) inode=16294 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=71 name=(null) inode=16299 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=72 name=(null) inode=16291 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=73 name=(null) inode=16300 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=74 name=(null) inode=16300 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=75 name=(null) inode=16301 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=76 name=(null) inode=16300 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=77 name=(null) inode=16302 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=78 name=(null) inode=16300 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=79 name=(null) inode=16303 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=80 name=(null) inode=16300 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=81 name=(null) inode=16304 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=82 name=(null) inode=16300 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=83 name=(null) inode=16305 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=84 name=(null) inode=16291 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=85 name=(null) inode=16306 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=86 name=(null) inode=16306 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=87 name=(null) inode=16307 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=88 name=(null) inode=16306 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=89 name=(null) inode=16308 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=90 name=(null) inode=16306 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=91 name=(null) inode=16309 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=92 name=(null) inode=16306 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=93 name=(null) inode=16310 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=94 name=(null) inode=16306 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=95 name=(null) inode=16311 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=96 name=(null) inode=16291 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=97 name=(null) inode=16312 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=98 name=(null) inode=16312 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=99 name=(null) inode=16313 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=100 name=(null) inode=16312 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=101 name=(null) inode=16314 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=102 name=(null) inode=16312 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=103 name=(null) inode=16315 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=104 name=(null) inode=16312 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=105 name=(null) inode=16316 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=106 name=(null) inode=16312 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=107 name=(null) inode=16317 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PATH item=109 name=(null) inode=16318 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:42:58.774000 audit: PROCTITLE proctitle="(udev-worker)" May 15 10:42:58.782632 kernel: vmw_vmci 0000:00:07.7: Found VMCI PCI device at 0x11080, irq 16 May 15 10:42:58.783747 kernel: vmw_vmci 0000:00:07.7: Using capabilities 0xc May 15 10:42:58.783829 kernel: piix4_smbus 0000:00:07.3: SMBus Host Controller not enabled! May 15 10:42:58.783930 kernel: Guest personality initialized and is active May 15 10:42:58.786253 systemd-networkd[1064]: lo: Link UP May 15 10:42:58.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:58.786258 systemd-networkd[1064]: lo: Gained carrier May 15 10:42:58.786541 systemd-networkd[1064]: Enumeration completed May 15 10:42:58.786603 systemd[1]: Started systemd-networkd.service. May 15 10:42:58.787000 systemd-networkd[1064]: ens192: Configuring with /etc/systemd/network/00-vmware.network. May 15 10:42:58.790884 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated May 15 10:42:58.791026 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps May 15 10:42:58.791120 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): ens192: link becomes ready May 15 10:42:58.790973 systemd-networkd[1064]: ens192: Link UP May 15 10:42:58.791087 systemd-networkd[1064]: ens192: Gained carrier May 15 10:42:58.798249 kernel: VMCI host device registered (name=vmci, major=10, minor=125) May 15 10:42:58.798294 kernel: Initialized host personality May 15 10:42:58.819331 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input3 May 15 10:42:58.842728 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 15 10:42:58.848209 kernel: mousedev: PS/2 mouse device common for all mice May 15 10:42:58.849066 (udev-worker)[1059]: id: Truncating stdout of 'dmi_memory_id' up to 16384 byte. May 15 10:42:58.866438 systemd[1]: Finished systemd-udev-settle.service. May 15 10:42:58.865000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:58.867430 systemd[1]: Starting lvm2-activation-early.service... May 15 10:42:58.884159 lvm[1088]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 15 10:42:58.906757 systemd[1]: Finished lvm2-activation-early.service. May 15 10:42:58.905000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:58.906948 systemd[1]: Reached target cryptsetup.target. May 15 10:42:58.907866 systemd[1]: Starting lvm2-activation.service... May 15 10:42:58.910547 lvm[1089]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 15 10:42:58.928749 systemd[1]: Finished lvm2-activation.service. May 15 10:42:58.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:58.928927 systemd[1]: Reached target local-fs-pre.target. May 15 10:42:58.929027 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 15 10:42:58.929044 systemd[1]: Reached target local-fs.target. May 15 10:42:58.929132 systemd[1]: Reached target machines.target. May 15 10:42:58.930077 systemd[1]: Starting ldconfig.service... May 15 10:42:58.930631 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:42:58.930663 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:42:58.931443 systemd[1]: Starting systemd-boot-update.service... May 15 10:42:58.932035 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 15 10:42:58.933069 systemd[1]: Starting systemd-machine-id-commit.service... May 15 10:42:58.934071 systemd[1]: Starting systemd-sysext.service... May 15 10:42:58.942059 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1091 (bootctl) May 15 10:42:58.942848 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 15 10:42:58.949634 systemd[1]: Unmounting usr-share-oem.mount... May 15 10:42:58.956112 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 15 10:42:58.955000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:58.964804 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 15 10:42:58.964916 systemd[1]: Unmounted usr-share-oem.mount. May 15 10:42:58.984225 kernel: loop0: detected capacity change from 0 to 218376 May 15 10:42:59.425660 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 15 10:42:59.426023 systemd[1]: Finished systemd-machine-id-commit.service. May 15 10:42:59.424000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:59.536210 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 15 10:42:59.556221 kernel: loop1: detected capacity change from 0 to 218376 May 15 10:42:59.565312 systemd-fsck[1100]: fsck.fat 4.2 (2021-01-31) May 15 10:42:59.565312 systemd-fsck[1100]: /dev/sda1: 790 files, 120732/258078 clusters May 15 10:42:59.568582 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 15 10:42:59.567000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:59.569601 systemd[1]: Mounting boot.mount... May 15 10:42:59.573795 (sd-sysext)[1103]: Using extensions 'kubernetes'. May 15 10:42:59.574283 (sd-sysext)[1103]: Merged extensions into '/usr'. May 15 10:42:59.586881 systemd[1]: Mounted boot.mount. May 15 10:42:59.587149 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:42:59.588261 systemd[1]: Mounting usr-share-oem.mount... May 15 10:42:59.591000 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:42:59.592875 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:42:59.593801 systemd[1]: Starting modprobe@loop.service... May 15 10:42:59.595404 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:42:59.595502 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:42:59.595580 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:42:59.596176 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:42:59.596288 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:42:59.595000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:59.595000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:59.596643 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:42:59.596726 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:42:59.595000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:59.595000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:59.597007 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:42:59.597075 systemd[1]: Finished modprobe@loop.service. May 15 10:42:59.596000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:59.596000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:59.597398 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 10:42:59.597462 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 10:42:59.598989 systemd[1]: Mounted usr-share-oem.mount. May 15 10:42:59.599838 systemd[1]: Finished systemd-boot-update.service. May 15 10:42:59.598000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:59.600309 systemd[1]: Finished systemd-sysext.service. May 15 10:42:59.599000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:59.601583 systemd[1]: Starting ensure-sysext.service... May 15 10:42:59.602774 systemd[1]: Starting systemd-tmpfiles-setup.service... May 15 10:42:59.607382 systemd[1]: Reloading. May 15 10:42:59.614569 systemd-tmpfiles[1111]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 15 10:42:59.616248 systemd-tmpfiles[1111]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 15 10:42:59.618516 systemd-tmpfiles[1111]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 15 10:42:59.652933 /usr/lib/systemd/system-generators/torcx-generator[1130]: time="2025-05-15T10:42:59Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 10:42:59.652950 /usr/lib/systemd/system-generators/torcx-generator[1130]: time="2025-05-15T10:42:59Z" level=info msg="torcx already run" May 15 10:42:59.717537 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 10:42:59.717846 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 10:42:59.733947 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 10:42:59.782000 audit: BPF prog-id=30 op=LOAD May 15 10:42:59.782000 audit: BPF prog-id=31 op=LOAD May 15 10:42:59.782000 audit: BPF prog-id=24 op=UNLOAD May 15 10:42:59.782000 audit: BPF prog-id=25 op=UNLOAD May 15 10:42:59.783000 audit: BPF prog-id=32 op=LOAD May 15 10:42:59.783000 audit: BPF prog-id=21 op=UNLOAD May 15 10:42:59.783000 audit: BPF prog-id=33 op=LOAD May 15 10:42:59.783000 audit: BPF prog-id=34 op=LOAD May 15 10:42:59.783000 audit: BPF prog-id=22 op=UNLOAD May 15 10:42:59.783000 audit: BPF prog-id=23 op=UNLOAD May 15 10:42:59.784000 audit: BPF prog-id=35 op=LOAD May 15 10:42:59.784000 audit: BPF prog-id=27 op=UNLOAD May 15 10:42:59.784000 audit: BPF prog-id=36 op=LOAD May 15 10:42:59.784000 audit: BPF prog-id=37 op=LOAD May 15 10:42:59.784000 audit: BPF prog-id=28 op=UNLOAD May 15 10:42:59.784000 audit: BPF prog-id=29 op=UNLOAD May 15 10:42:59.785000 audit: BPF prog-id=38 op=LOAD May 15 10:42:59.785000 audit: BPF prog-id=26 op=UNLOAD May 15 10:42:59.790029 systemd[1]: Finished systemd-tmpfiles-setup.service. May 15 10:42:59.789000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:59.792996 systemd[1]: Starting audit-rules.service... May 15 10:42:59.793975 systemd[1]: Starting clean-ca-certificates.service... May 15 10:42:59.794000 audit: BPF prog-id=39 op=LOAD May 15 10:42:59.795062 systemd[1]: Starting systemd-journal-catalog-update.service... May 15 10:42:59.796766 systemd[1]: Starting systemd-resolved.service... May 15 10:42:59.796000 audit: BPF prog-id=40 op=LOAD May 15 10:42:59.799241 systemd[1]: Starting systemd-timesyncd.service... May 15 10:42:59.800347 systemd[1]: Starting systemd-update-utmp.service... May 15 10:42:59.805000 audit[1197]: SYSTEM_BOOT pid=1197 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 15 10:42:59.806000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:59.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:59.807314 systemd[1]: Finished clean-ca-certificates.service. May 15 10:42:59.808725 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 10:42:59.809845 systemd[1]: Finished systemd-update-utmp.service. May 15 10:42:59.819981 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:42:59.820913 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:42:59.821909 systemd[1]: Starting modprobe@loop.service... May 15 10:42:59.822079 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:42:59.822258 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:42:59.822370 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 10:42:59.822926 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:42:59.823003 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:42:59.821000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:59.821000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:59.823525 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:42:59.823610 systemd[1]: Finished modprobe@loop.service. May 15 10:42:59.822000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:59.822000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:59.823993 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 10:42:59.825389 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:42:59.825466 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:42:59.824000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:59.824000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:59.828266 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:42:59.829748 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:42:59.832240 systemd[1]: Starting modprobe@loop.service... May 15 10:42:59.832413 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:42:59.832551 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:42:59.832673 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 10:42:59.837769 systemd[1]: Starting modprobe@drm.service... May 15 10:42:59.837970 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:42:59.838100 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:42:59.840305 systemd[1]: Starting systemd-networkd-wait-online.service... May 15 10:42:59.840468 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 10:42:59.842019 systemd[1]: Finished ensure-sysext.service. May 15 10:42:59.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:59.844303 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:42:59.843000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:59.843000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:59.844429 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:42:59.850781 systemd[1]: modprobe@drm.service: Deactivated successfully. May 15 10:42:59.850865 systemd[1]: Finished modprobe@drm.service. May 15 10:42:59.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:59.849000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:59.851527 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:42:59.851639 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:42:59.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:59.850000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:59.851800 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 10:42:59.852756 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:42:59.852827 systemd[1]: Finished modprobe@loop.service. May 15 10:42:59.851000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:59.851000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:59.852977 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 10:42:59.855341 systemd[1]: Finished systemd-journal-catalog-update.service. May 15 10:42:59.854000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:42:59.882281 augenrules[1219]: No rules May 15 10:42:59.880000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 15 10:42:59.880000 audit[1219]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffca0798910 a2=420 a3=0 items=0 ppid=1191 pid=1219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:42:59.880000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 15 10:42:59.882511 systemd[1]: Finished audit-rules.service. May 15 10:42:59.886595 systemd-resolved[1194]: Positive Trust Anchors: May 15 10:42:59.886606 systemd-resolved[1194]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 15 10:42:59.886625 systemd-resolved[1194]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 15 10:42:59.887603 systemd[1]: Started systemd-timesyncd.service. May 15 10:42:59.887765 systemd[1]: Reached target time-set.target. May 15 10:42:59.912323 systemd-resolved[1194]: Defaulting to hostname 'linux'. May 15 10:42:59.913957 systemd[1]: Started systemd-resolved.service. May 15 10:42:59.914156 systemd[1]: Reached target network.target. May 15 10:42:59.914277 systemd[1]: Reached target nss-lookup.target. May 15 10:42:59.920181 ldconfig[1090]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 15 10:42:59.935535 systemd[1]: Finished ldconfig.service. May 15 10:42:59.936975 systemd[1]: Starting systemd-update-done.service... May 15 10:42:59.941321 systemd[1]: Finished systemd-update-done.service. May 15 10:42:59.941550 systemd[1]: Reached target sysinit.target. May 15 10:42:59.941736 systemd[1]: Started motdgen.path. May 15 10:42:59.941911 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 15 10:42:59.942164 systemd[1]: Started logrotate.timer. May 15 10:42:59.942351 systemd[1]: Started mdadm.timer. May 15 10:42:59.942461 systemd[1]: Started systemd-tmpfiles-clean.timer. May 15 10:42:59.942579 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 15 10:42:59.942607 systemd[1]: Reached target paths.target. May 15 10:42:59.942713 systemd[1]: Reached target timers.target. May 15 10:42:59.943052 systemd[1]: Listening on dbus.socket. May 15 10:42:59.944247 systemd[1]: Starting docker.socket... May 15 10:42:59.946690 systemd[1]: Listening on sshd.socket. May 15 10:42:59.947005 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:42:59.947394 systemd[1]: Listening on docker.socket. May 15 10:42:59.947676 systemd[1]: Reached target sockets.target. May 15 10:42:59.947854 systemd[1]: Reached target basic.target. May 15 10:42:59.948054 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 15 10:42:59.948080 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 15 10:42:59.949432 systemd[1]: Starting containerd.service... May 15 10:42:59.951003 systemd[1]: Starting dbus.service... May 15 10:42:59.952123 systemd[1]: Starting enable-oem-cloudinit.service... May 15 10:42:59.954465 systemd[1]: Starting extend-filesystems.service... May 15 10:42:59.954635 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 15 10:42:59.957939 jq[1230]: false May 15 10:42:59.956703 systemd[1]: Starting motdgen.service... May 15 10:42:59.958221 systemd[1]: Starting ssh-key-proc-cmdline.service... May 15 10:42:59.959187 systemd[1]: Starting sshd-keygen.service... May 15 10:42:59.961270 systemd[1]: Starting systemd-logind.service... May 15 10:42:59.962254 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:42:59.962306 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 15 10:42:59.962829 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 15 10:42:59.963247 systemd[1]: Starting update-engine.service... May 15 10:42:59.966942 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 15 10:42:59.969628 systemd[1]: Starting vmtoolsd.service... May 15 10:42:59.970762 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 15 10:42:59.981423 extend-filesystems[1231]: Found loop1 May 15 10:42:59.981423 extend-filesystems[1231]: Found sda May 15 10:42:59.981423 extend-filesystems[1231]: Found sda1 May 15 10:42:59.981423 extend-filesystems[1231]: Found sda2 May 15 10:42:59.981423 extend-filesystems[1231]: Found sda3 May 15 10:42:59.981423 extend-filesystems[1231]: Found usr May 15 10:42:59.981423 extend-filesystems[1231]: Found sda4 May 15 10:42:59.986377 jq[1240]: true May 15 10:42:59.970892 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 15 10:42:59.986530 extend-filesystems[1231]: Found sda6 May 15 10:42:59.986530 extend-filesystems[1231]: Found sda7 May 15 10:42:59.986530 extend-filesystems[1231]: Found sda9 May 15 10:42:59.986530 extend-filesystems[1231]: Checking size of /dev/sda9 May 15 10:42:59.971095 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 15 10:42:59.971207 systemd[1]: Finished ssh-key-proc-cmdline.service. May 15 10:42:59.982687 systemd[1]: motdgen.service: Deactivated successfully. May 15 10:42:59.982808 systemd[1]: Finished motdgen.service. May 15 10:42:59.989231 jq[1246]: true May 15 10:42:59.986524 systemd[1]: Started vmtoolsd.service. May 15 10:42:59.993183 dbus-daemon[1229]: [system] SELinux support is enabled May 15 10:42:59.993799 systemd[1]: Started dbus.service. May 15 10:42:59.995240 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 15 10:42:59.995260 systemd[1]: Reached target system-config.target. May 15 10:42:59.995381 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 15 10:42:59.995395 systemd[1]: Reached target user-config.target. May 15 10:43:00.001673 extend-filesystems[1231]: Old size kept for /dev/sda9 May 15 10:43:00.011422 extend-filesystems[1231]: Found sr0 May 15 10:43:00.017399 systemd[1]: extend-filesystems.service: Deactivated successfully. May 15 10:43:00.017500 systemd[1]: Finished extend-filesystems.service. May 15 10:43:00.034239 env[1248]: time="2025-05-15T10:43:00.034180459Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 15 10:44:20.634978 systemd-timesyncd[1195]: Contacted time server 162.159.200.123:123 (0.flatcar.pool.ntp.org). May 15 10:44:20.635008 systemd-timesyncd[1195]: Initial clock synchronization to Thu 2025-05-15 10:44:20.634901 UTC. May 15 10:44:20.637995 systemd-resolved[1194]: Clock change detected. Flushing caches. May 15 10:44:20.640210 kernel: NET: Registered PF_VSOCK protocol family May 15 10:44:20.650583 bash[1281]: Updated "/home/core/.ssh/authorized_keys" May 15 10:44:20.651575 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 15 10:44:20.653013 update_engine[1239]: I0515 10:44:20.651876 1239 main.cc:92] Flatcar Update Engine starting May 15 10:44:20.655188 systemd[1]: Started update-engine.service. May 15 10:44:20.655824 systemd-logind[1238]: Watching system buttons on /dev/input/event1 (Power Button) May 15 10:44:20.655970 systemd-logind[1238]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 15 10:44:20.656115 systemd-logind[1238]: New seat seat0. May 15 10:44:20.656663 systemd[1]: Started locksmithd.service. May 15 10:44:20.657151 update_engine[1239]: I0515 10:44:20.657128 1239 update_check_scheduler.cc:74] Next update check in 7m5s May 15 10:44:20.657552 systemd[1]: Started systemd-logind.service. May 15 10:44:20.681254 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:44:20.681753 env[1248]: time="2025-05-15T10:44:20.681449731Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 15 10:44:20.681753 env[1248]: time="2025-05-15T10:44:20.681553398Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 15 10:44:20.681296 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:44:20.682286 env[1248]: time="2025-05-15T10:44:20.682268283Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.182-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 15 10:44:20.682316 env[1248]: time="2025-05-15T10:44:20.682285156Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 15 10:44:20.682404 env[1248]: time="2025-05-15T10:44:20.682390656Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 15 10:44:20.682404 env[1248]: time="2025-05-15T10:44:20.682402083Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 15 10:44:20.682446 env[1248]: time="2025-05-15T10:44:20.682409829Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 15 10:44:20.682446 env[1248]: time="2025-05-15T10:44:20.682415306Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 15 10:44:20.682483 env[1248]: time="2025-05-15T10:44:20.682454871Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 15 10:44:20.682602 env[1248]: time="2025-05-15T10:44:20.682590495Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 15 10:44:20.682671 env[1248]: time="2025-05-15T10:44:20.682658931Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 15 10:44:20.682671 env[1248]: time="2025-05-15T10:44:20.682669613Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 15 10:44:20.682713 env[1248]: time="2025-05-15T10:44:20.682697761Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 15 10:44:20.682713 env[1248]: time="2025-05-15T10:44:20.682704440Z" level=info msg="metadata content store policy set" policy=shared May 15 10:44:20.684330 env[1248]: time="2025-05-15T10:44:20.684313038Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 15 10:44:20.684366 env[1248]: time="2025-05-15T10:44:20.684332224Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 15 10:44:20.684366 env[1248]: time="2025-05-15T10:44:20.684340461Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 15 10:44:20.684366 env[1248]: time="2025-05-15T10:44:20.684358203Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 15 10:44:20.684421 env[1248]: time="2025-05-15T10:44:20.684365990Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 15 10:44:20.684421 env[1248]: time="2025-05-15T10:44:20.684373815Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 15 10:44:20.684421 env[1248]: time="2025-05-15T10:44:20.684380568Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 15 10:44:20.684421 env[1248]: time="2025-05-15T10:44:20.684389089Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 15 10:44:20.684421 env[1248]: time="2025-05-15T10:44:20.684397550Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 15 10:44:20.684421 env[1248]: time="2025-05-15T10:44:20.684404856Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 15 10:44:20.684421 env[1248]: time="2025-05-15T10:44:20.684411597Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 15 10:44:20.684421 env[1248]: time="2025-05-15T10:44:20.684418299Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 15 10:44:20.684544 env[1248]: time="2025-05-15T10:44:20.684473471Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 15 10:44:20.684544 env[1248]: time="2025-05-15T10:44:20.684519833Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 15 10:44:20.684656 env[1248]: time="2025-05-15T10:44:20.684644421Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 15 10:44:20.684693 env[1248]: time="2025-05-15T10:44:20.684670398Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 15 10:44:20.684693 env[1248]: time="2025-05-15T10:44:20.684683707Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 15 10:44:20.684728 env[1248]: time="2025-05-15T10:44:20.684710535Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 15 10:44:20.684728 env[1248]: time="2025-05-15T10:44:20.684718495Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 15 10:44:20.684728 env[1248]: time="2025-05-15T10:44:20.684725187Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 15 10:44:20.684777 env[1248]: time="2025-05-15T10:44:20.684731099Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 15 10:44:20.684777 env[1248]: time="2025-05-15T10:44:20.684737750Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 15 10:44:20.684777 env[1248]: time="2025-05-15T10:44:20.684746923Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 15 10:44:20.684777 env[1248]: time="2025-05-15T10:44:20.684754086Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 15 10:44:20.684777 env[1248]: time="2025-05-15T10:44:20.684761214Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 15 10:44:20.684777 env[1248]: time="2025-05-15T10:44:20.684768950Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 15 10:44:20.684865 env[1248]: time="2025-05-15T10:44:20.684833357Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 15 10:44:20.684865 env[1248]: time="2025-05-15T10:44:20.684842066Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 15 10:44:20.684865 env[1248]: time="2025-05-15T10:44:20.684848341Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 15 10:44:20.684865 env[1248]: time="2025-05-15T10:44:20.684854052Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 15 10:44:20.684865 env[1248]: time="2025-05-15T10:44:20.684861756Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 15 10:44:20.684942 env[1248]: time="2025-05-15T10:44:20.684868001Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 15 10:44:20.684942 env[1248]: time="2025-05-15T10:44:20.684880304Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 15 10:44:20.684942 env[1248]: time="2025-05-15T10:44:20.684902188Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 15 10:44:20.685055 env[1248]: time="2025-05-15T10:44:20.685024109Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 15 10:44:20.685055 env[1248]: time="2025-05-15T10:44:20.685058976Z" level=info msg="Connect containerd service" May 15 10:44:20.687114 env[1248]: time="2025-05-15T10:44:20.685079088Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 15 10:44:20.687114 env[1248]: time="2025-05-15T10:44:20.685463481Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 15 10:44:20.687114 env[1248]: time="2025-05-15T10:44:20.685582539Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 15 10:44:20.687114 env[1248]: time="2025-05-15T10:44:20.685608315Z" level=info msg=serving... address=/run/containerd/containerd.sock May 15 10:44:20.687114 env[1248]: time="2025-05-15T10:44:20.686147028Z" level=info msg="containerd successfully booted in 0.064204s" May 15 10:44:20.687114 env[1248]: time="2025-05-15T10:44:20.686435003Z" level=info msg="Start subscribing containerd event" May 15 10:44:20.687114 env[1248]: time="2025-05-15T10:44:20.686466170Z" level=info msg="Start recovering state" May 15 10:44:20.687114 env[1248]: time="2025-05-15T10:44:20.686504186Z" level=info msg="Start event monitor" May 15 10:44:20.687114 env[1248]: time="2025-05-15T10:44:20.686516674Z" level=info msg="Start snapshots syncer" May 15 10:44:20.687114 env[1248]: time="2025-05-15T10:44:20.686522662Z" level=info msg="Start cni network conf syncer for default" May 15 10:44:20.687114 env[1248]: time="2025-05-15T10:44:20.686529215Z" level=info msg="Start streaming server" May 15 10:44:20.685669 systemd[1]: Started containerd.service. May 15 10:44:20.764834 locksmithd[1286]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 15 10:44:20.977286 systemd-networkd[1064]: ens192: Gained IPv6LL May 15 10:44:20.978204 systemd[1]: Finished systemd-networkd-wait-online.service. May 15 10:44:20.978484 systemd[1]: Reached target network-online.target. May 15 10:44:20.980222 systemd[1]: Starting kubelet.service... May 15 10:44:21.702301 systemd[1]: Started kubelet.service. May 15 10:44:22.018269 sshd_keygen[1261]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 15 10:44:22.037030 systemd[1]: Finished sshd-keygen.service. May 15 10:44:22.038254 systemd[1]: Starting issuegen.service... May 15 10:44:22.041899 systemd[1]: issuegen.service: Deactivated successfully. May 15 10:44:22.042000 systemd[1]: Finished issuegen.service. May 15 10:44:22.043211 systemd[1]: Starting systemd-user-sessions.service... May 15 10:44:22.048396 systemd[1]: Finished systemd-user-sessions.service. May 15 10:44:22.049429 systemd[1]: Started getty@tty1.service. May 15 10:44:22.050262 systemd[1]: Started serial-getty@ttyS0.service. May 15 10:44:22.050460 systemd[1]: Reached target getty.target. May 15 10:44:22.050597 systemd[1]: Reached target multi-user.target. May 15 10:44:22.051515 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 15 10:44:22.056534 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 15 10:44:22.056627 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 15 10:44:22.056812 systemd[1]: Startup finished in 887ms (kernel) + 9.279s (initrd) + 5.632s (userspace) = 15.798s. May 15 10:44:22.090718 login[1360]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) May 15 10:44:22.091995 login[1361]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) May 15 10:44:22.098237 systemd[1]: Created slice user-500.slice. May 15 10:44:22.099077 systemd[1]: Starting user-runtime-dir@500.service... May 15 10:44:22.100714 systemd-logind[1238]: New session 1 of user core. May 15 10:44:22.105883 systemd-logind[1238]: New session 2 of user core. May 15 10:44:22.108469 systemd[1]: Finished user-runtime-dir@500.service. May 15 10:44:22.109514 systemd[1]: Starting user@500.service... May 15 10:44:22.112266 (systemd)[1364]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 15 10:44:22.161469 systemd[1364]: Queued start job for default target default.target. May 15 10:44:22.161807 systemd[1364]: Reached target paths.target. May 15 10:44:22.161820 systemd[1364]: Reached target sockets.target. May 15 10:44:22.161829 systemd[1364]: Reached target timers.target. May 15 10:44:22.161837 systemd[1364]: Reached target basic.target. May 15 10:44:22.161899 systemd[1]: Started user@500.service. May 15 10:44:22.162672 systemd[1]: Started session-1.scope. May 15 10:44:22.163215 systemd[1]: Started session-2.scope. May 15 10:44:22.163737 systemd[1364]: Reached target default.target. May 15 10:44:22.163836 systemd[1364]: Startup finished in 47ms. May 15 10:44:22.326467 kubelet[1343]: E0515 10:44:22.326396 1343 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 10:44:22.327491 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 10:44:22.327568 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 10:44:32.465465 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 15 10:44:32.465589 systemd[1]: Stopped kubelet.service. May 15 10:44:32.466574 systemd[1]: Starting kubelet.service... May 15 10:44:32.523222 systemd[1]: Started kubelet.service. May 15 10:44:32.630966 kubelet[1388]: E0515 10:44:32.630934 1388 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 10:44:32.633478 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 10:44:32.633563 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 10:44:42.715549 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 15 10:44:42.715709 systemd[1]: Stopped kubelet.service. May 15 10:44:42.716922 systemd[1]: Starting kubelet.service... May 15 10:44:42.982333 systemd[1]: Started kubelet.service. May 15 10:44:43.005397 kubelet[1397]: E0515 10:44:43.005363 1397 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 10:44:43.006517 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 10:44:43.006588 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 10:44:50.780920 systemd[1]: Created slice system-sshd.slice. May 15 10:44:50.782035 systemd[1]: Started sshd@0-139.178.70.104:22-147.75.109.163:46824.service. May 15 10:44:50.872345 sshd[1403]: Accepted publickey for core from 147.75.109.163 port 46824 ssh2: RSA SHA256:5jNLHoTZfjCzTOKQrCP5LbgIW1XBYqjk9sc7IZ/f9u8 May 15 10:44:50.873324 sshd[1403]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:44:50.875797 systemd-logind[1238]: New session 3 of user core. May 15 10:44:50.876310 systemd[1]: Started session-3.scope. May 15 10:44:50.924321 systemd[1]: Started sshd@1-139.178.70.104:22-147.75.109.163:46826.service. May 15 10:44:50.954646 sshd[1408]: Accepted publickey for core from 147.75.109.163 port 46826 ssh2: RSA SHA256:5jNLHoTZfjCzTOKQrCP5LbgIW1XBYqjk9sc7IZ/f9u8 May 15 10:44:50.955562 sshd[1408]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:44:50.958862 systemd[1]: Started session-4.scope. May 15 10:44:50.959836 systemd-logind[1238]: New session 4 of user core. May 15 10:44:51.011749 sshd[1408]: pam_unix(sshd:session): session closed for user core May 15 10:44:51.014055 systemd[1]: Started sshd@2-139.178.70.104:22-147.75.109.163:46840.service. May 15 10:44:51.015905 systemd[1]: sshd@1-139.178.70.104:22-147.75.109.163:46826.service: Deactivated successfully. May 15 10:44:51.016425 systemd[1]: session-4.scope: Deactivated successfully. May 15 10:44:51.017549 systemd-logind[1238]: Session 4 logged out. Waiting for processes to exit. May 15 10:44:51.018156 systemd-logind[1238]: Removed session 4. May 15 10:44:51.045326 sshd[1413]: Accepted publickey for core from 147.75.109.163 port 46840 ssh2: RSA SHA256:5jNLHoTZfjCzTOKQrCP5LbgIW1XBYqjk9sc7IZ/f9u8 May 15 10:44:51.045947 sshd[1413]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:44:51.049498 systemd[1]: Started session-5.scope. May 15 10:44:51.049753 systemd-logind[1238]: New session 5 of user core. May 15 10:44:51.097862 sshd[1413]: pam_unix(sshd:session): session closed for user core May 15 10:44:51.100688 systemd[1]: Started sshd@3-139.178.70.104:22-147.75.109.163:46856.service. May 15 10:44:51.101002 systemd[1]: sshd@2-139.178.70.104:22-147.75.109.163:46840.service: Deactivated successfully. May 15 10:44:51.101441 systemd[1]: session-5.scope: Deactivated successfully. May 15 10:44:51.102348 systemd-logind[1238]: Session 5 logged out. Waiting for processes to exit. May 15 10:44:51.103142 systemd-logind[1238]: Removed session 5. May 15 10:44:51.131531 sshd[1419]: Accepted publickey for core from 147.75.109.163 port 46856 ssh2: RSA SHA256:5jNLHoTZfjCzTOKQrCP5LbgIW1XBYqjk9sc7IZ/f9u8 May 15 10:44:51.132734 sshd[1419]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:44:51.136622 systemd[1]: Started session-6.scope. May 15 10:44:51.137066 systemd-logind[1238]: New session 6 of user core. May 15 10:44:51.188943 sshd[1419]: pam_unix(sshd:session): session closed for user core May 15 10:44:51.191885 systemd[1]: sshd@3-139.178.70.104:22-147.75.109.163:46856.service: Deactivated successfully. May 15 10:44:51.192327 systemd[1]: session-6.scope: Deactivated successfully. May 15 10:44:51.192785 systemd-logind[1238]: Session 6 logged out. Waiting for processes to exit. May 15 10:44:51.193740 systemd[1]: Started sshd@4-139.178.70.104:22-147.75.109.163:46866.service. May 15 10:44:51.194520 systemd-logind[1238]: Removed session 6. May 15 10:44:51.222009 sshd[1426]: Accepted publickey for core from 147.75.109.163 port 46866 ssh2: RSA SHA256:5jNLHoTZfjCzTOKQrCP5LbgIW1XBYqjk9sc7IZ/f9u8 May 15 10:44:51.222853 sshd[1426]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:44:51.225854 systemd[1]: Started session-7.scope. May 15 10:44:51.226226 systemd-logind[1238]: New session 7 of user core. May 15 10:44:51.453632 sudo[1429]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 15 10:44:51.454349 sudo[1429]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 10:44:51.463310 dbus-daemon[1229]: Ѝ\xf2\u001f^U: received setenforce notice (enforcing=-961287728) May 15 10:44:51.464568 sudo[1429]: pam_unix(sudo:session): session closed for user root May 15 10:44:51.471302 sshd[1426]: pam_unix(sshd:session): session closed for user core May 15 10:44:51.474042 systemd[1]: sshd@4-139.178.70.104:22-147.75.109.163:46866.service: Deactivated successfully. May 15 10:44:51.474489 systemd[1]: session-7.scope: Deactivated successfully. May 15 10:44:51.474981 systemd-logind[1238]: Session 7 logged out. Waiting for processes to exit. May 15 10:44:51.475761 systemd[1]: Started sshd@5-139.178.70.104:22-147.75.109.163:46878.service. May 15 10:44:51.476339 systemd-logind[1238]: Removed session 7. May 15 10:44:51.503657 sshd[1433]: Accepted publickey for core from 147.75.109.163 port 46878 ssh2: RSA SHA256:5jNLHoTZfjCzTOKQrCP5LbgIW1XBYqjk9sc7IZ/f9u8 May 15 10:44:51.505255 sshd[1433]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:44:51.509229 systemd[1]: Started session-8.scope. May 15 10:44:51.509577 systemd-logind[1238]: New session 8 of user core. May 15 10:44:51.560875 sudo[1437]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 15 10:44:51.561056 sudo[1437]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 10:44:51.563280 sudo[1437]: pam_unix(sudo:session): session closed for user root May 15 10:44:51.566872 sudo[1436]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 15 10:44:51.567056 sudo[1436]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 10:44:51.573543 systemd[1]: Stopping audit-rules.service... May 15 10:44:51.573000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 15 10:44:51.575696 kernel: kauditd_printk_skb: 292 callbacks suppressed May 15 10:44:51.575729 kernel: audit: type=1305 audit(1747305891.573:213): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 15 10:44:51.573000 audit[1440]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe7a1ca5a0 a2=420 a3=0 items=0 ppid=1 pid=1440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:51.581676 kernel: audit: type=1300 audit(1747305891.573:213): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe7a1ca5a0 a2=420 a3=0 items=0 ppid=1 pid=1440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:51.581717 kernel: audit: type=1327 audit(1747305891.573:213): proctitle=2F7362696E2F617564697463746C002D44 May 15 10:44:51.573000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 15 10:44:51.583001 auditctl[1440]: No rules May 15 10:44:51.583381 systemd[1]: audit-rules.service: Deactivated successfully. May 15 10:44:51.583523 systemd[1]: Stopped audit-rules.service. May 15 10:44:51.582000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:44:51.584819 systemd[1]: Starting audit-rules.service... May 15 10:44:51.587212 kernel: audit: type=1131 audit(1747305891.582:214): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:44:51.596282 augenrules[1457]: No rules May 15 10:44:51.595000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:44:51.596882 systemd[1]: Finished audit-rules.service. May 15 10:44:51.600208 kernel: audit: type=1130 audit(1747305891.595:215): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:44:51.600235 sudo[1436]: pam_unix(sudo:session): session closed for user root May 15 10:44:51.599000 audit[1436]: USER_END pid=1436 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:44:51.603950 sshd[1433]: pam_unix(sshd:session): session closed for user core May 15 10:44:51.604361 kernel: audit: type=1106 audit(1747305891.599:216): pid=1436 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:44:51.599000 audit[1436]: CRED_DISP pid=1436 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:44:51.608589 kernel: audit: type=1104 audit(1747305891.599:217): pid=1436 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:44:51.608590 systemd[1]: sshd@5-139.178.70.104:22-147.75.109.163:46878.service: Deactivated successfully. May 15 10:44:51.603000 audit[1433]: USER_END pid=1433 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:44:51.608919 systemd[1]: session-8.scope: Deactivated successfully. May 15 10:44:51.616231 kernel: audit: type=1106 audit(1747305891.603:218): pid=1433 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:44:51.616284 kernel: audit: type=1104 audit(1747305891.603:219): pid=1433 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:44:51.616300 kernel: audit: type=1131 audit(1747305891.607:220): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.70.104:22-147.75.109.163:46878 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:44:51.603000 audit[1433]: CRED_DISP pid=1433 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:44:51.607000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.70.104:22-147.75.109.163:46878 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:44:51.612568 systemd-logind[1238]: Session 8 logged out. Waiting for processes to exit. May 15 10:44:51.613177 systemd[1]: Started sshd@6-139.178.70.104:22-147.75.109.163:46892.service. May 15 10:44:51.619076 systemd-logind[1238]: Removed session 8. May 15 10:44:51.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.104:22-147.75.109.163:46892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:44:51.639000 audit[1463]: USER_ACCT pid=1463 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:44:51.641338 sshd[1463]: Accepted publickey for core from 147.75.109.163 port 46892 ssh2: RSA SHA256:5jNLHoTZfjCzTOKQrCP5LbgIW1XBYqjk9sc7IZ/f9u8 May 15 10:44:51.640000 audit[1463]: CRED_ACQ pid=1463 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:44:51.640000 audit[1463]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd1098bb40 a2=3 a3=0 items=0 ppid=1 pid=1463 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:51.640000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:44:51.642171 sshd[1463]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:44:51.645078 systemd-logind[1238]: New session 9 of user core. May 15 10:44:51.645522 systemd[1]: Started session-9.scope. May 15 10:44:51.647000 audit[1463]: USER_START pid=1463 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:44:51.648000 audit[1465]: CRED_ACQ pid=1465 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:44:51.694000 audit[1466]: USER_ACCT pid=1466 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:44:51.694000 audit[1466]: CRED_REFR pid=1466 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:44:51.695705 sudo[1466]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 15 10:44:51.695893 sudo[1466]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 10:44:51.696000 audit[1466]: USER_START pid=1466 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:44:51.702980 systemd[1]: /etc/systemd/system/coreos-metadata.service:11: Ignoring unknown escape sequences: "echo "COREOS_CUSTOM_PRIVATE_IPV4=$(ip addr show ens192 | grep "inet 10." | grep -Po "inet \K[\d.]+") May 15 10:44:51.704783 systemd[1]: Starting coreos-metadata.service... May 15 10:44:51.718000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:44:51.718000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:44:51.719592 systemd[1]: coreos-metadata.service: Deactivated successfully. May 15 10:44:51.719692 systemd[1]: Finished coreos-metadata.service. May 15 10:44:52.276985 systemd[1]: Stopped kubelet.service. May 15 10:44:52.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:44:52.276000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:44:52.279321 systemd[1]: Starting kubelet.service... May 15 10:44:52.299158 systemd[1]: Reloading. May 15 10:44:52.367808 /usr/lib/systemd/system-generators/torcx-generator[1527]: time="2025-05-15T10:44:52Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 10:44:52.368008 /usr/lib/systemd/system-generators/torcx-generator[1527]: time="2025-05-15T10:44:52Z" level=info msg="torcx already run" May 15 10:44:52.418074 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 10:44:52.418184 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 10:44:52.429763 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 10:44:52.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.466000 audit: BPF prog-id=46 op=LOAD May 15 10:44:52.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.466000 audit: BPF prog-id=47 op=LOAD May 15 10:44:52.466000 audit: BPF prog-id=30 op=UNLOAD May 15 10:44:52.466000 audit: BPF prog-id=31 op=UNLOAD May 15 10:44:52.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.467000 audit: BPF prog-id=48 op=LOAD May 15 10:44:52.467000 audit: BPF prog-id=44 op=UNLOAD May 15 10:44:52.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.468000 audit: BPF prog-id=49 op=LOAD May 15 10:44:52.468000 audit: BPF prog-id=32 op=UNLOAD May 15 10:44:52.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.468000 audit: BPF prog-id=50 op=LOAD May 15 10:44:52.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.468000 audit: BPF prog-id=51 op=LOAD May 15 10:44:52.468000 audit: BPF prog-id=33 op=UNLOAD May 15 10:44:52.468000 audit: BPF prog-id=34 op=UNLOAD May 15 10:44:52.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.469000 audit: BPF prog-id=52 op=LOAD May 15 10:44:52.469000 audit: BPF prog-id=35 op=UNLOAD May 15 10:44:52.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.470000 audit: BPF prog-id=53 op=LOAD May 15 10:44:52.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.470000 audit: BPF prog-id=54 op=LOAD May 15 10:44:52.470000 audit: BPF prog-id=36 op=UNLOAD May 15 10:44:52.470000 audit: BPF prog-id=37 op=UNLOAD May 15 10:44:52.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.471000 audit: BPF prog-id=55 op=LOAD May 15 10:44:52.471000 audit: BPF prog-id=39 op=UNLOAD May 15 10:44:52.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.472000 audit: BPF prog-id=56 op=LOAD May 15 10:44:52.472000 audit: BPF prog-id=38 op=UNLOAD May 15 10:44:52.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.474000 audit: BPF prog-id=57 op=LOAD May 15 10:44:52.474000 audit: BPF prog-id=40 op=UNLOAD May 15 10:44:52.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.475000 audit: BPF prog-id=58 op=LOAD May 15 10:44:52.475000 audit: BPF prog-id=41 op=UNLOAD May 15 10:44:52.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.475000 audit: BPF prog-id=59 op=LOAD May 15 10:44:52.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:52.475000 audit: BPF prog-id=60 op=LOAD May 15 10:44:52.475000 audit: BPF prog-id=42 op=UNLOAD May 15 10:44:52.475000 audit: BPF prog-id=43 op=UNLOAD May 15 10:44:52.485120 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM May 15 10:44:52.485252 systemd[1]: kubelet.service: Failed with result 'signal'. May 15 10:44:52.485419 systemd[1]: Stopped kubelet.service. May 15 10:44:52.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 10:44:52.486584 systemd[1]: Starting kubelet.service... May 15 10:44:52.737306 systemd[1]: Started kubelet.service. May 15 10:44:52.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:44:52.770387 kubelet[1593]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 10:44:52.770597 kubelet[1593]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 15 10:44:52.770635 kubelet[1593]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 10:44:52.770732 kubelet[1593]: I0515 10:44:52.770713 1593 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 15 10:44:52.991396 kubelet[1593]: I0515 10:44:52.991209 1593 server.go:520] "Kubelet version" kubeletVersion="v1.32.0" May 15 10:44:52.991489 kubelet[1593]: I0515 10:44:52.991480 1593 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 15 10:44:52.991848 kubelet[1593]: I0515 10:44:52.991837 1593 server.go:954] "Client rotation is on, will bootstrap in background" May 15 10:44:53.166336 kubelet[1593]: I0515 10:44:53.166317 1593 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 15 10:44:53.174673 kubelet[1593]: E0515 10:44:53.174643 1593 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 15 10:44:53.174673 kubelet[1593]: I0515 10:44:53.174669 1593 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 15 10:44:53.176187 kubelet[1593]: I0515 10:44:53.176175 1593 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 15 10:44:53.176865 kubelet[1593]: I0515 10:44:53.176844 1593 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 15 10:44:53.176969 kubelet[1593]: I0515 10:44:53.176865 1593 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.67.124.136","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 15 10:44:53.177047 kubelet[1593]: I0515 10:44:53.176971 1593 topology_manager.go:138] "Creating topology manager with none policy" May 15 10:44:53.177047 kubelet[1593]: I0515 10:44:53.176978 1593 container_manager_linux.go:304] "Creating device plugin manager" May 15 10:44:53.177047 kubelet[1593]: I0515 10:44:53.177042 1593 state_mem.go:36] "Initialized new in-memory state store" May 15 10:44:53.180023 kubelet[1593]: I0515 10:44:53.180011 1593 kubelet.go:446] "Attempting to sync node with API server" May 15 10:44:53.180023 kubelet[1593]: I0515 10:44:53.180024 1593 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 15 10:44:53.180077 kubelet[1593]: I0515 10:44:53.180036 1593 kubelet.go:352] "Adding apiserver pod source" May 15 10:44:53.180077 kubelet[1593]: I0515 10:44:53.180042 1593 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 15 10:44:53.184398 kubelet[1593]: E0515 10:44:53.184383 1593 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:44:53.184432 kubelet[1593]: E0515 10:44:53.184408 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:44:53.186561 kubelet[1593]: I0515 10:44:53.186545 1593 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 15 10:44:53.186832 kubelet[1593]: I0515 10:44:53.186819 1593 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 15 10:44:53.187373 kubelet[1593]: W0515 10:44:53.187362 1593 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 15 10:44:53.188790 kubelet[1593]: I0515 10:44:53.188778 1593 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 15 10:44:53.188820 kubelet[1593]: I0515 10:44:53.188800 1593 server.go:1287] "Started kubelet" May 15 10:44:53.196000 audit[1593]: AVC avc: denied { mac_admin } for pid=1593 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:53.196000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:44:53.196000 audit[1593]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000adea50 a1=c000531a40 a2=c000adea20 a3=25 items=0 ppid=1 pid=1593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:53.196000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:44:53.196000 audit[1593]: AVC avc: denied { mac_admin } for pid=1593 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:53.196000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:44:53.196000 audit[1593]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a90900 a1=c000531a58 a2=c000adeae0 a3=25 items=0 ppid=1 pid=1593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:53.196000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:44:53.198323 kubelet[1593]: I0515 10:44:53.198030 1593 kubelet.go:1513] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 15 10:44:53.198323 kubelet[1593]: I0515 10:44:53.198060 1593 kubelet.go:1517] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 15 10:44:53.198642 kubelet[1593]: I0515 10:44:53.198609 1593 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 15 10:44:53.198755 kubelet[1593]: I0515 10:44:53.198744 1593 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 15 10:44:53.198798 kubelet[1593]: I0515 10:44:53.198784 1593 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 15 10:44:53.199631 kubelet[1593]: I0515 10:44:53.199615 1593 server.go:490] "Adding debug handlers to kubelet server" May 15 10:44:53.201764 kubelet[1593]: I0515 10:44:53.201741 1593 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 15 10:44:53.205463 kubelet[1593]: I0515 10:44:53.205175 1593 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 15 10:44:53.205646 kubelet[1593]: E0515 10:44:53.204423 1593 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.136.183fad73c576e3c1 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.136,UID:10.67.124.136,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:10.67.124.136,},FirstTimestamp:2025-05-15 10:44:53.188789185 +0000 UTC m=+0.449038988,LastTimestamp:2025-05-15 10:44:53.188789185 +0000 UTC m=+0.449038988,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.136,}" May 15 10:44:53.205797 kubelet[1593]: W0515 10:44:53.205785 1593 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "10.67.124.136" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope May 15 10:44:53.205953 kubelet[1593]: E0515 10:44:53.205939 1593 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes \"10.67.124.136\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" May 15 10:44:53.206065 kubelet[1593]: W0515 10:44:53.206053 1593 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope May 15 10:44:53.206147 kubelet[1593]: E0515 10:44:53.206128 1593 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" May 15 10:44:53.208089 kubelet[1593]: I0515 10:44:53.208077 1593 volume_manager.go:297] "Starting Kubelet Volume Manager" May 15 10:44:53.208609 kubelet[1593]: I0515 10:44:53.208600 1593 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 15 10:44:53.208788 kubelet[1593]: I0515 10:44:53.208781 1593 reconciler.go:26] "Reconciler: start to sync state" May 15 10:44:53.209056 kubelet[1593]: I0515 10:44:53.209048 1593 factory.go:221] Registration of the systemd container factory successfully May 15 10:44:53.209163 kubelet[1593]: I0515 10:44:53.209152 1593 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 15 10:44:53.209594 kubelet[1593]: E0515 10:44:53.209584 1593 kubelet.go:1561] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 15 10:44:53.210505 kubelet[1593]: I0515 10:44:53.210496 1593 factory.go:221] Registration of the containerd container factory successfully May 15 10:44:53.215560 kubelet[1593]: E0515 10:44:53.215538 1593 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.67.124.136\" not found" May 15 10:44:53.230758 kubelet[1593]: W0515 10:44:53.230733 1593 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope May 15 10:44:53.230843 kubelet[1593]: E0515 10:44:53.230767 1593 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User \"system:anonymous\" cannot list resource \"csidrivers\" in API group \"storage.k8s.io\" at the cluster scope" logger="UnhandledError" May 15 10:44:53.233929 kubelet[1593]: E0515 10:44:53.233862 1593 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.67.124.136.183fad73c6b41add default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.67.124.136,UID:10.67.124.136,APIVersion:,ResourceVersion:,FieldPath:,},Reason:InvalidDiskCapacity,Message:invalid capacity 0 on image filesystem,Source:EventSource{Component:kubelet,Host:10.67.124.136,},FirstTimestamp:2025-05-15 10:44:53.209578205 +0000 UTC m=+0.469828012,LastTimestamp:2025-05-15 10:44:53.209578205 +0000 UTC m=+0.469828012,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.67.124.136,}" May 15 10:44:53.234198 kubelet[1593]: E0515 10:44:53.234181 1593 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.67.124.136\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" May 15 10:44:53.234923 kubelet[1593]: I0515 10:44:53.234915 1593 cpu_manager.go:221] "Starting CPU manager" policy="none" May 15 10:44:53.235019 kubelet[1593]: I0515 10:44:53.235013 1593 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 15 10:44:53.235074 kubelet[1593]: I0515 10:44:53.235063 1593 state_mem.go:36] "Initialized new in-memory state store" May 15 10:44:53.236068 kubelet[1593]: I0515 10:44:53.236060 1593 policy_none.go:49] "None policy: Start" May 15 10:44:53.236636 kubelet[1593]: I0515 10:44:53.236628 1593 memory_manager.go:186] "Starting memorymanager" policy="None" May 15 10:44:53.236708 kubelet[1593]: I0515 10:44:53.236694 1593 state_mem.go:35] "Initializing new in-memory state store" May 15 10:44:53.235000 audit[1607]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1607 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:44:53.235000 audit[1607]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffc92ef050 a2=0 a3=7fffc92ef03c items=0 ppid=1593 pid=1607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:53.235000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 15 10:44:53.237000 audit[1613]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1613 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:44:53.237000 audit[1613]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffdb927a370 a2=0 a3=7ffdb927a35c items=0 ppid=1593 pid=1613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:53.237000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 15 10:44:53.241226 systemd[1]: Created slice kubepods.slice. May 15 10:44:53.245057 systemd[1]: Created slice kubepods-burstable.slice. May 15 10:44:53.250387 systemd[1]: Created slice kubepods-besteffort.slice. May 15 10:44:53.258179 kubelet[1593]: I0515 10:44:53.258165 1593 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 15 10:44:53.257000 audit[1593]: AVC avc: denied { mac_admin } for pid=1593 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:53.257000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:44:53.257000 audit[1593]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b864b0 a1=c000b39a28 a2=c000b86480 a3=25 items=0 ppid=1 pid=1593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:53.258535 kubelet[1593]: I0515 10:44:53.258525 1593 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 15 10:44:53.257000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:44:53.259528 kubelet[1593]: I0515 10:44:53.259144 1593 eviction_manager.go:189] "Eviction manager: starting control loop" May 15 10:44:53.259831 kubelet[1593]: I0515 10:44:53.259810 1593 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 15 10:44:53.260807 kubelet[1593]: E0515 10:44:53.260617 1593 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 15 10:44:53.260876 kubelet[1593]: E0515 10:44:53.260868 1593 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.67.124.136\" not found" May 15 10:44:53.260986 kubelet[1593]: I0515 10:44:53.260979 1593 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 15 10:44:53.239000 audit[1615]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1615 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:44:53.239000 audit[1615]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff2679cb20 a2=0 a3=7fff2679cb0c items=0 ppid=1593 pid=1615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:53.239000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 10:44:53.264000 audit[1620]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1620 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:44:53.264000 audit[1620]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffedaeb8700 a2=0 a3=7ffedaeb86ec items=0 ppid=1593 pid=1620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:53.264000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 10:44:53.304000 audit[1625]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1625 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:44:53.304000 audit[1625]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff687fd4a0 a2=0 a3=7fff687fd48c items=0 ppid=1593 pid=1625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:53.304000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 15 10:44:53.306458 kubelet[1593]: I0515 10:44:53.306439 1593 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 15 10:44:53.305000 audit[1626]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1626 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:44:53.305000 audit[1626]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe5e8ee7e0 a2=0 a3=7ffe5e8ee7cc items=0 ppid=1593 pid=1626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:53.305000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 15 10:44:53.307237 kubelet[1593]: I0515 10:44:53.307227 1593 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 15 10:44:53.307291 kubelet[1593]: I0515 10:44:53.307281 1593 status_manager.go:227] "Starting to sync pod status with apiserver" May 15 10:44:53.307412 kubelet[1593]: I0515 10:44:53.307405 1593 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 15 10:44:53.307462 kubelet[1593]: I0515 10:44:53.307455 1593 kubelet.go:2388] "Starting kubelet main sync loop" May 15 10:44:53.307579 kubelet[1593]: E0515 10:44:53.307569 1593 kubelet.go:2412] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" May 15 10:44:53.306000 audit[1627]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1627 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:44:53.306000 audit[1627]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd0e4c5f20 a2=0 a3=7ffd0e4c5f0c items=0 ppid=1593 pid=1627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:53.306000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 15 10:44:53.307000 audit[1628]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1628 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:44:53.307000 audit[1628]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeb6e41560 a2=0 a3=7ffeb6e4154c items=0 ppid=1593 pid=1628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:53.307000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 15 10:44:53.307000 audit[1629]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=1629 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:44:53.307000 audit[1629]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd3a61fc70 a2=0 a3=7ffd3a61fc5c items=0 ppid=1593 pid=1629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:53.307000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 15 10:44:53.307000 audit[1630]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=1630 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:44:53.307000 audit[1630]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc38f5cd60 a2=0 a3=7ffc38f5cd4c items=0 ppid=1593 pid=1630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:53.307000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 15 10:44:53.308000 audit[1631]: NETFILTER_CFG table=filter:12 family=10 entries=2 op=nft_register_chain pid=1631 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:44:53.308000 audit[1631]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd1e8aef00 a2=0 a3=7ffd1e8aeeec items=0 ppid=1593 pid=1631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:53.308000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 15 10:44:53.309000 audit[1632]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_chain pid=1632 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:44:53.309000 audit[1632]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe3dc0d910 a2=0 a3=7ffe3dc0d8fc items=0 ppid=1593 pid=1632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:53.309000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 15 10:44:53.362244 kubelet[1593]: I0515 10:44:53.362228 1593 kubelet_node_status.go:76] "Attempting to register node" node="10.67.124.136" May 15 10:44:53.364883 kubelet[1593]: I0515 10:44:53.364867 1593 kubelet_node_status.go:79] "Successfully registered node" node="10.67.124.136" May 15 10:44:53.365013 kubelet[1593]: E0515 10:44:53.364990 1593 kubelet_node_status.go:549] "Error updating node status, will retry" err="error getting node \"10.67.124.136\": node \"10.67.124.136\" not found" May 15 10:44:53.368572 kubelet[1593]: E0515 10:44:53.368557 1593 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.67.124.136\" not found" May 15 10:44:53.469506 kubelet[1593]: E0515 10:44:53.469481 1593 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.67.124.136\" not found" May 15 10:44:53.571016 kubelet[1593]: E0515 10:44:53.570185 1593 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.67.124.136\" not found" May 15 10:44:53.672051 kubelet[1593]: E0515 10:44:53.672030 1593 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.67.124.136\" not found" May 15 10:44:53.751000 audit[1466]: USER_END pid=1466 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:44:53.752000 audit[1466]: CRED_DISP pid=1466 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:44:53.753129 sudo[1466]: pam_unix(sudo:session): session closed for user root May 15 10:44:53.753906 sshd[1463]: pam_unix(sshd:session): session closed for user core May 15 10:44:53.753000 audit[1463]: USER_END pid=1463 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:44:53.753000 audit[1463]: CRED_DISP pid=1463 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 15 10:44:53.755635 systemd[1]: sshd@6-139.178.70.104:22-147.75.109.163:46892.service: Deactivated successfully. May 15 10:44:53.754000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.104:22-147.75.109.163:46892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:44:53.756042 systemd[1]: session-9.scope: Deactivated successfully. May 15 10:44:53.756466 systemd-logind[1238]: Session 9 logged out. Waiting for processes to exit. May 15 10:44:53.757117 systemd-logind[1238]: Removed session 9. May 15 10:44:53.772921 kubelet[1593]: E0515 10:44:53.772897 1593 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.67.124.136\" not found" May 15 10:44:53.873619 kubelet[1593]: E0515 10:44:53.873547 1593 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.67.124.136\" not found" May 15 10:44:53.974163 kubelet[1593]: E0515 10:44:53.974141 1593 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.67.124.136\" not found" May 15 10:44:54.044971 kubelet[1593]: I0515 10:44:54.044924 1593 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" May 15 10:44:54.045130 kubelet[1593]: W0515 10:44:54.045112 1593 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 15 10:44:54.075307 kubelet[1593]: E0515 10:44:54.075279 1593 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.67.124.136\" not found" May 15 10:44:54.176175 kubelet[1593]: E0515 10:44:54.176069 1593 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.67.124.136\" not found" May 15 10:44:54.185306 kubelet[1593]: E0515 10:44:54.185277 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:44:54.276899 kubelet[1593]: I0515 10:44:54.276863 1593 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" May 15 10:44:54.278726 kubelet[1593]: I0515 10:44:54.278651 1593 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" May 15 10:44:54.278806 env[1248]: time="2025-05-15T10:44:54.277234651Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 15 10:44:55.185991 kubelet[1593]: I0515 10:44:55.185968 1593 apiserver.go:52] "Watching apiserver" May 15 10:44:55.186258 kubelet[1593]: E0515 10:44:55.186240 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:44:55.188600 kubelet[1593]: E0515 10:44:55.188584 1593 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ltzxd" podUID="9e0bf444-ae9d-48a1-95c6-b12cd232dbd4" May 15 10:44:55.192888 systemd[1]: Created slice kubepods-besteffort-pod9eeceaeb_986d_4dbd_b7db_faec2dc69fa2.slice. May 15 10:44:55.208039 systemd[1]: Created slice kubepods-besteffort-pod6fd8c815_2796_416f_9b56_ef5aeff15207.slice. May 15 10:44:55.209713 kubelet[1593]: I0515 10:44:55.209693 1593 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 15 10:44:55.219902 kubelet[1593]: I0515 10:44:55.219869 1593 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/6fd8c815-2796-416f-9b56-ef5aeff15207-lib-modules\") pod \"kube-proxy-jnjt2\" (UID: \"6fd8c815-2796-416f-9b56-ef5aeff15207\") " pod="kube-system/kube-proxy-jnjt2" May 15 10:44:55.219902 kubelet[1593]: I0515 10:44:55.219902 1593 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/9eeceaeb-986d-4dbd-b7db-faec2dc69fa2-policysync\") pod \"calico-node-wgkwz\" (UID: \"9eeceaeb-986d-4dbd-b7db-faec2dc69fa2\") " pod="calico-system/calico-node-wgkwz" May 15 10:44:55.220018 kubelet[1593]: I0515 10:44:55.219927 1593 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/9eeceaeb-986d-4dbd-b7db-faec2dc69fa2-var-lib-calico\") pod \"calico-node-wgkwz\" (UID: \"9eeceaeb-986d-4dbd-b7db-faec2dc69fa2\") " pod="calico-system/calico-node-wgkwz" May 15 10:44:55.220018 kubelet[1593]: I0515 10:44:55.219943 1593 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/9eeceaeb-986d-4dbd-b7db-faec2dc69fa2-cni-bin-dir\") pod \"calico-node-wgkwz\" (UID: \"9eeceaeb-986d-4dbd-b7db-faec2dc69fa2\") " pod="calico-system/calico-node-wgkwz" May 15 10:44:55.220018 kubelet[1593]: I0515 10:44:55.219958 1593 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/9eeceaeb-986d-4dbd-b7db-faec2dc69fa2-cni-net-dir\") pod \"calico-node-wgkwz\" (UID: \"9eeceaeb-986d-4dbd-b7db-faec2dc69fa2\") " pod="calico-system/calico-node-wgkwz" May 15 10:44:55.220018 kubelet[1593]: I0515 10:44:55.219974 1593 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/9eeceaeb-986d-4dbd-b7db-faec2dc69fa2-cni-log-dir\") pod \"calico-node-wgkwz\" (UID: \"9eeceaeb-986d-4dbd-b7db-faec2dc69fa2\") " pod="calico-system/calico-node-wgkwz" May 15 10:44:55.220018 kubelet[1593]: I0515 10:44:55.219990 1593 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/9e0bf444-ae9d-48a1-95c6-b12cd232dbd4-registration-dir\") pod \"csi-node-driver-ltzxd\" (UID: \"9e0bf444-ae9d-48a1-95c6-b12cd232dbd4\") " pod="calico-system/csi-node-driver-ltzxd" May 15 10:44:55.220109 kubelet[1593]: I0515 10:44:55.220007 1593 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/6fd8c815-2796-416f-9b56-ef5aeff15207-kube-proxy\") pod \"kube-proxy-jnjt2\" (UID: \"6fd8c815-2796-416f-9b56-ef5aeff15207\") " pod="kube-system/kube-proxy-jnjt2" May 15 10:44:55.220109 kubelet[1593]: I0515 10:44:55.220024 1593 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/9eeceaeb-986d-4dbd-b7db-faec2dc69fa2-node-certs\") pod \"calico-node-wgkwz\" (UID: \"9eeceaeb-986d-4dbd-b7db-faec2dc69fa2\") " pod="calico-system/calico-node-wgkwz" May 15 10:44:55.220109 kubelet[1593]: I0515 10:44:55.220042 1593 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8zrnl\" (UniqueName: \"kubernetes.io/projected/9eeceaeb-986d-4dbd-b7db-faec2dc69fa2-kube-api-access-8zrnl\") pod \"calico-node-wgkwz\" (UID: \"9eeceaeb-986d-4dbd-b7db-faec2dc69fa2\") " pod="calico-system/calico-node-wgkwz" May 15 10:44:55.220109 kubelet[1593]: I0515 10:44:55.220060 1593 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/6fd8c815-2796-416f-9b56-ef5aeff15207-xtables-lock\") pod \"kube-proxy-jnjt2\" (UID: \"6fd8c815-2796-416f-9b56-ef5aeff15207\") " pod="kube-system/kube-proxy-jnjt2" May 15 10:44:55.220109 kubelet[1593]: I0515 10:44:55.220076 1593 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/9eeceaeb-986d-4dbd-b7db-faec2dc69fa2-lib-modules\") pod \"calico-node-wgkwz\" (UID: \"9eeceaeb-986d-4dbd-b7db-faec2dc69fa2\") " pod="calico-system/calico-node-wgkwz" May 15 10:44:55.220215 kubelet[1593]: I0515 10:44:55.220091 1593 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/9eeceaeb-986d-4dbd-b7db-faec2dc69fa2-flexvol-driver-host\") pod \"calico-node-wgkwz\" (UID: \"9eeceaeb-986d-4dbd-b7db-faec2dc69fa2\") " pod="calico-system/calico-node-wgkwz" May 15 10:44:55.220215 kubelet[1593]: I0515 10:44:55.220106 1593 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4j25t\" (UniqueName: \"kubernetes.io/projected/9e0bf444-ae9d-48a1-95c6-b12cd232dbd4-kube-api-access-4j25t\") pod \"csi-node-driver-ltzxd\" (UID: \"9e0bf444-ae9d-48a1-95c6-b12cd232dbd4\") " pod="calico-system/csi-node-driver-ltzxd" May 15 10:44:55.220215 kubelet[1593]: I0515 10:44:55.220122 1593 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/9eeceaeb-986d-4dbd-b7db-faec2dc69fa2-xtables-lock\") pod \"calico-node-wgkwz\" (UID: \"9eeceaeb-986d-4dbd-b7db-faec2dc69fa2\") " pod="calico-system/calico-node-wgkwz" May 15 10:44:55.220215 kubelet[1593]: I0515 10:44:55.220139 1593 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/9eeceaeb-986d-4dbd-b7db-faec2dc69fa2-tigera-ca-bundle\") pod \"calico-node-wgkwz\" (UID: \"9eeceaeb-986d-4dbd-b7db-faec2dc69fa2\") " pod="calico-system/calico-node-wgkwz" May 15 10:44:55.220215 kubelet[1593]: I0515 10:44:55.220153 1593 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/9eeceaeb-986d-4dbd-b7db-faec2dc69fa2-var-run-calico\") pod \"calico-node-wgkwz\" (UID: \"9eeceaeb-986d-4dbd-b7db-faec2dc69fa2\") " pod="calico-system/calico-node-wgkwz" May 15 10:44:55.220305 kubelet[1593]: I0515 10:44:55.220170 1593 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/9e0bf444-ae9d-48a1-95c6-b12cd232dbd4-varrun\") pod \"csi-node-driver-ltzxd\" (UID: \"9e0bf444-ae9d-48a1-95c6-b12cd232dbd4\") " pod="calico-system/csi-node-driver-ltzxd" May 15 10:44:55.220305 kubelet[1593]: I0515 10:44:55.220187 1593 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/9e0bf444-ae9d-48a1-95c6-b12cd232dbd4-kubelet-dir\") pod \"csi-node-driver-ltzxd\" (UID: \"9e0bf444-ae9d-48a1-95c6-b12cd232dbd4\") " pod="calico-system/csi-node-driver-ltzxd" May 15 10:44:55.220305 kubelet[1593]: I0515 10:44:55.220212 1593 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/9e0bf444-ae9d-48a1-95c6-b12cd232dbd4-socket-dir\") pod \"csi-node-driver-ltzxd\" (UID: \"9e0bf444-ae9d-48a1-95c6-b12cd232dbd4\") " pod="calico-system/csi-node-driver-ltzxd" May 15 10:44:55.220305 kubelet[1593]: I0515 10:44:55.220229 1593 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-c7tf9\" (UniqueName: \"kubernetes.io/projected/6fd8c815-2796-416f-9b56-ef5aeff15207-kube-api-access-c7tf9\") pod \"kube-proxy-jnjt2\" (UID: \"6fd8c815-2796-416f-9b56-ef5aeff15207\") " pod="kube-system/kube-proxy-jnjt2" May 15 10:44:55.322206 kubelet[1593]: I0515 10:44:55.322176 1593 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 15 10:44:55.326640 kubelet[1593]: E0515 10:44:55.326538 1593 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:44:55.326640 kubelet[1593]: W0515 10:44:55.326557 1593 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:44:55.326640 kubelet[1593]: E0515 10:44:55.326572 1593 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:44:55.337516 kubelet[1593]: E0515 10:44:55.337502 1593 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:44:55.337606 kubelet[1593]: W0515 10:44:55.337597 1593 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:44:55.337664 kubelet[1593]: E0515 10:44:55.337656 1593 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:44:55.337822 kubelet[1593]: E0515 10:44:55.337816 1593 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:44:55.337867 kubelet[1593]: W0515 10:44:55.337859 1593 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:44:55.337918 kubelet[1593]: E0515 10:44:55.337910 1593 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:44:55.338056 kubelet[1593]: E0515 10:44:55.338043 1593 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:44:55.338056 kubelet[1593]: W0515 10:44:55.338054 1593 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:44:55.338104 kubelet[1593]: E0515 10:44:55.338068 1593 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:44:55.507514 env[1248]: time="2025-05-15T10:44:55.507484125Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-wgkwz,Uid:9eeceaeb-986d-4dbd-b7db-faec2dc69fa2,Namespace:calico-system,Attempt:0,}" May 15 10:44:55.510406 env[1248]: time="2025-05-15T10:44:55.510205658Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-jnjt2,Uid:6fd8c815-2796-416f-9b56-ef5aeff15207,Namespace:kube-system,Attempt:0,}" May 15 10:44:56.060856 env[1248]: time="2025-05-15T10:44:56.060756098Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:44:56.061271 env[1248]: time="2025-05-15T10:44:56.061246879Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:44:56.062454 env[1248]: time="2025-05-15T10:44:56.062433758Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:44:56.063601 env[1248]: time="2025-05-15T10:44:56.063585361Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:44:56.065311 env[1248]: time="2025-05-15T10:44:56.065296602Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:44:56.067220 env[1248]: time="2025-05-15T10:44:56.067175744Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:44:56.067752 env[1248]: time="2025-05-15T10:44:56.067727302Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:44:56.068231 env[1248]: time="2025-05-15T10:44:56.068200837Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:44:56.083092 env[1248]: time="2025-05-15T10:44:56.075578931Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:44:56.083092 env[1248]: time="2025-05-15T10:44:56.075595001Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:44:56.083092 env[1248]: time="2025-05-15T10:44:56.075612183Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:44:56.083092 env[1248]: time="2025-05-15T10:44:56.075708985Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7296d85ed8c2745be08ee34a52751dc40dc00bd956c03414c6e76cf702bd57a1 pid=1659 runtime=io.containerd.runc.v2 May 15 10:44:56.083092 env[1248]: time="2025-05-15T10:44:56.075214812Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:44:56.083092 env[1248]: time="2025-05-15T10:44:56.075239574Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:44:56.083092 env[1248]: time="2025-05-15T10:44:56.075246307Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:44:56.083092 env[1248]: time="2025-05-15T10:44:56.075327452Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6ec182929d94af44921a98e85d9b5881d1fe08808f590f2b58d6bbbbb6684a4e pid=1660 runtime=io.containerd.runc.v2 May 15 10:44:56.092695 systemd[1]: Started cri-containerd-7296d85ed8c2745be08ee34a52751dc40dc00bd956c03414c6e76cf702bd57a1.scope. May 15 10:44:56.101340 systemd[1]: Started cri-containerd-6ec182929d94af44921a98e85d9b5881d1fe08808f590f2b58d6bbbbb6684a4e.scope. May 15 10:44:56.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.109000 audit: BPF prog-id=61 op=LOAD May 15 10:44:56.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.110000 audit: BPF prog-id=62 op=LOAD May 15 10:44:56.110000 audit[1677]: AVC avc: denied { bpf } for pid=1677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.110000 audit[1677]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1660 pid=1677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:56.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665633138323932396439346166343439323161393865383564396235 May 15 10:44:56.110000 audit[1677]: AVC avc: denied { perfmon } for pid=1677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.110000 audit[1677]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1660 pid=1677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:56.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665633138323932396439346166343439323161393865383564396235 May 15 10:44:56.111000 audit[1677]: AVC avc: denied { bpf } for pid=1677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit[1677]: AVC avc: denied { bpf } for pid=1677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit[1677]: AVC avc: denied { bpf } for pid=1677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit[1677]: AVC avc: denied { perfmon } for pid=1677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit[1677]: AVC avc: denied { perfmon } for pid=1677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit[1677]: AVC avc: denied { perfmon } for pid=1677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit[1677]: AVC avc: denied { perfmon } for pid=1677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit[1677]: AVC avc: denied { perfmon } for pid=1677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit[1677]: AVC avc: denied { bpf } for pid=1677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit[1677]: AVC avc: denied { bpf } for pid=1677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit: BPF prog-id=63 op=LOAD May 15 10:44:56.111000 audit[1677]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00024d330 items=0 ppid=1660 pid=1677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:56.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665633138323932396439346166343439323161393865383564396235 May 15 10:44:56.111000 audit[1677]: AVC avc: denied { bpf } for pid=1677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit[1677]: AVC avc: denied { bpf } for pid=1677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit[1677]: AVC avc: denied { perfmon } for pid=1677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit[1677]: AVC avc: denied { perfmon } for pid=1677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit[1677]: AVC avc: denied { perfmon } for pid=1677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit[1677]: AVC avc: denied { perfmon } for pid=1677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit[1677]: AVC avc: denied { perfmon } for pid=1677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit[1677]: AVC avc: denied { bpf } for pid=1677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit[1677]: AVC avc: denied { bpf } for pid=1677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit: BPF prog-id=64 op=LOAD May 15 10:44:56.111000 audit[1677]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00024d378 items=0 ppid=1660 pid=1677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:56.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665633138323932396439346166343439323161393865383564396235 May 15 10:44:56.111000 audit: BPF prog-id=64 op=UNLOAD May 15 10:44:56.111000 audit: BPF prog-id=63 op=UNLOAD May 15 10:44:56.111000 audit[1677]: AVC avc: denied { bpf } for pid=1677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit[1677]: AVC avc: denied { bpf } for pid=1677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit[1677]: AVC avc: denied { bpf } for pid=1677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit[1677]: AVC avc: denied { perfmon } for pid=1677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit[1677]: AVC avc: denied { perfmon } for pid=1677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit[1677]: AVC avc: denied { perfmon } for pid=1677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit[1677]: AVC avc: denied { perfmon } for pid=1677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit[1677]: AVC avc: denied { perfmon } for pid=1677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit[1677]: AVC avc: denied { bpf } for pid=1677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit[1677]: AVC avc: denied { bpf } for pid=1677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit: BPF prog-id=65 op=LOAD May 15 10:44:56.111000 audit[1677]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00024d788 items=0 ppid=1660 pid=1677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:56.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665633138323932396439346166343439323161393865383564396235 May 15 10:44:56.111000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit[1678]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1659 pid=1678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:56.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732393664383565643863323734356265303865653334613532373531 May 15 10:44:56.111000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit[1678]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1659 pid=1678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:56.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732393664383565643863323734356265303865653334613532373531 May 15 10:44:56.111000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit: BPF prog-id=66 op=LOAD May 15 10:44:56.111000 audit[1678]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000185110 items=0 ppid=1659 pid=1678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:56.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732393664383565643863323734356265303865653334613532373531 May 15 10:44:56.111000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit: BPF prog-id=67 op=LOAD May 15 10:44:56.111000 audit[1678]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000185158 items=0 ppid=1659 pid=1678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:56.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732393664383565643863323734356265303865653334613532373531 May 15 10:44:56.111000 audit: BPF prog-id=67 op=UNLOAD May 15 10:44:56.111000 audit: BPF prog-id=66 op=UNLOAD May 15 10:44:56.111000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:56.111000 audit: BPF prog-id=68 op=LOAD May 15 10:44:56.111000 audit[1678]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000185568 items=0 ppid=1659 pid=1678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:56.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732393664383565643863323734356265303865653334613532373531 May 15 10:44:56.122801 env[1248]: time="2025-05-15T10:44:56.122763864Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-wgkwz,Uid:9eeceaeb-986d-4dbd-b7db-faec2dc69fa2,Namespace:calico-system,Attempt:0,} returns sandbox id \"7296d85ed8c2745be08ee34a52751dc40dc00bd956c03414c6e76cf702bd57a1\"" May 15 10:44:56.124394 env[1248]: time="2025-05-15T10:44:56.124363012Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 15 10:44:56.127375 env[1248]: time="2025-05-15T10:44:56.127338694Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-jnjt2,Uid:6fd8c815-2796-416f-9b56-ef5aeff15207,Namespace:kube-system,Attempt:0,} returns sandbox id \"6ec182929d94af44921a98e85d9b5881d1fe08808f590f2b58d6bbbbb6684a4e\"" May 15 10:44:56.186464 kubelet[1593]: E0515 10:44:56.186435 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:44:56.326949 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2575683317.mount: Deactivated successfully. May 15 10:44:57.187402 kubelet[1593]: E0515 10:44:57.187358 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:44:57.308231 kubelet[1593]: E0515 10:44:57.308016 1593 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ltzxd" podUID="9e0bf444-ae9d-48a1-95c6-b12cd232dbd4" May 15 10:44:57.426888 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3890190422.mount: Deactivated successfully. May 15 10:44:57.510764 env[1248]: time="2025-05-15T10:44:57.510723292Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:44:57.511360 env[1248]: time="2025-05-15T10:44:57.511343629Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:44:57.512000 env[1248]: time="2025-05-15T10:44:57.511987068Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:44:57.512702 env[1248]: time="2025-05-15T10:44:57.512688959Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:44:57.513005 env[1248]: time="2025-05-15T10:44:57.512991038Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5\"" May 15 10:44:57.513815 env[1248]: time="2025-05-15T10:44:57.513802843Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.4\"" May 15 10:44:57.514805 env[1248]: time="2025-05-15T10:44:57.514782977Z" level=info msg="CreateContainer within sandbox \"7296d85ed8c2745be08ee34a52751dc40dc00bd956c03414c6e76cf702bd57a1\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 15 10:44:57.520185 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1527893646.mount: Deactivated successfully. May 15 10:44:57.534849 env[1248]: time="2025-05-15T10:44:57.534692986Z" level=info msg="CreateContainer within sandbox \"7296d85ed8c2745be08ee34a52751dc40dc00bd956c03414c6e76cf702bd57a1\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"5da799e6cc6595248ae254b65984f286531853bedd16131e0ad8241838092dca\"" May 15 10:44:57.535071 env[1248]: time="2025-05-15T10:44:57.535057388Z" level=info msg="StartContainer for \"5da799e6cc6595248ae254b65984f286531853bedd16131e0ad8241838092dca\"" May 15 10:44:57.547089 systemd[1]: Started cri-containerd-5da799e6cc6595248ae254b65984f286531853bedd16131e0ad8241838092dca.scope. May 15 10:44:57.561406 kernel: kauditd_printk_skb: 356 callbacks suppressed May 15 10:44:57.561494 kernel: audit: type=1400 audit(1747305897.556:464): avc: denied { perfmon } for pid=1731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:57.556000 audit[1731]: AVC avc: denied { perfmon } for pid=1731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:57.565309 kernel: audit: type=1300 audit(1747305897.556:464): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f67ab7627c8 items=0 ppid=1659 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:57.556000 audit[1731]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f67ab7627c8 items=0 ppid=1659 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:57.556000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564613739396536636336353935323438616532353462363539383466 May 15 10:44:57.569016 kernel: audit: type=1327 audit(1747305897.556:464): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564613739396536636336353935323438616532353462363539383466 May 15 10:44:57.556000 audit[1731]: AVC avc: denied { bpf } for pid=1731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:57.572252 kernel: audit: type=1400 audit(1747305897.556:465): avc: denied { bpf } for pid=1731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:57.556000 audit[1731]: AVC avc: denied { bpf } for pid=1731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:57.556000 audit[1731]: AVC avc: denied { bpf } for pid=1731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:57.578279 kernel: audit: type=1400 audit(1747305897.556:465): avc: denied { bpf } for pid=1731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:57.578313 kernel: audit: type=1400 audit(1747305897.556:465): avc: denied { bpf } for pid=1731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:57.556000 audit[1731]: AVC avc: denied { perfmon } for pid=1731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:57.584476 kernel: audit: type=1400 audit(1747305897.556:465): avc: denied { perfmon } for pid=1731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:57.587232 kernel: audit: type=1400 audit(1747305897.556:465): avc: denied { perfmon } for pid=1731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:57.587273 kernel: audit: type=1400 audit(1747305897.556:465): avc: denied { perfmon } for pid=1731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:57.556000 audit[1731]: AVC avc: denied { perfmon } for pid=1731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:57.556000 audit[1731]: AVC avc: denied { perfmon } for pid=1731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:57.556000 audit[1731]: AVC avc: denied { perfmon } for pid=1731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:57.590482 kernel: audit: type=1400 audit(1747305897.556:465): avc: denied { perfmon } for pid=1731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:57.590142 systemd[1]: cri-containerd-5da799e6cc6595248ae254b65984f286531853bedd16131e0ad8241838092dca.scope: Deactivated successfully. May 15 10:44:57.556000 audit[1731]: AVC avc: denied { perfmon } for pid=1731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:57.556000 audit[1731]: AVC avc: denied { bpf } for pid=1731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:57.556000 audit[1731]: AVC avc: denied { bpf } for pid=1731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:57.590762 env[1248]: time="2025-05-15T10:44:57.590737069Z" level=info msg="StartContainer for \"5da799e6cc6595248ae254b65984f286531853bedd16131e0ad8241838092dca\" returns successfully" May 15 10:44:57.556000 audit: BPF prog-id=69 op=LOAD May 15 10:44:57.556000 audit[1731]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c000337bd8 items=0 ppid=1659 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:57.556000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564613739396536636336353935323438616532353462363539383466 May 15 10:44:57.556000 audit[1731]: AVC avc: denied { bpf } for pid=1731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:57.556000 audit[1731]: AVC avc: denied { bpf } for pid=1731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:57.556000 audit[1731]: AVC avc: denied { perfmon } for pid=1731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:57.556000 audit[1731]: AVC avc: denied { perfmon } for pid=1731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:57.556000 audit[1731]: AVC avc: denied { perfmon } for pid=1731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:57.556000 audit[1731]: AVC avc: denied { perfmon } for pid=1731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:57.556000 audit[1731]: AVC avc: denied { perfmon } for pid=1731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:57.556000 audit[1731]: AVC avc: denied { bpf } for pid=1731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:57.556000 audit[1731]: AVC avc: denied { bpf } for pid=1731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:57.556000 audit: BPF prog-id=70 op=LOAD May 15 10:44:57.556000 audit[1731]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000337c28 items=0 ppid=1659 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:57.556000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564613739396536636336353935323438616532353462363539383466 May 15 10:44:57.556000 audit: BPF prog-id=70 op=UNLOAD May 15 10:44:57.556000 audit: BPF prog-id=69 op=UNLOAD May 15 10:44:57.556000 audit[1731]: AVC avc: denied { bpf } for pid=1731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:57.556000 audit[1731]: AVC avc: denied { bpf } for pid=1731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:57.556000 audit[1731]: AVC avc: denied { bpf } for pid=1731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:57.556000 audit[1731]: AVC avc: denied { perfmon } for pid=1731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:57.556000 audit[1731]: AVC avc: denied { perfmon } for pid=1731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:57.556000 audit[1731]: AVC avc: denied { perfmon } for pid=1731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:57.556000 audit[1731]: AVC avc: denied { perfmon } for pid=1731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:57.556000 audit[1731]: AVC avc: denied { perfmon } for pid=1731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:57.556000 audit[1731]: AVC avc: denied { bpf } for pid=1731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:57.556000 audit[1731]: AVC avc: denied { bpf } for pid=1731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:57.556000 audit: BPF prog-id=71 op=LOAD May 15 10:44:57.556000 audit[1731]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c000337cb8 items=0 ppid=1659 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:57.556000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564613739396536636336353935323438616532353462363539383466 May 15 10:44:57.593000 audit: BPF prog-id=71 op=UNLOAD May 15 10:44:57.658297 env[1248]: time="2025-05-15T10:44:57.658228139Z" level=info msg="shim disconnected" id=5da799e6cc6595248ae254b65984f286531853bedd16131e0ad8241838092dca May 15 10:44:57.658428 env[1248]: time="2025-05-15T10:44:57.658416510Z" level=warning msg="cleaning up after shim disconnected" id=5da799e6cc6595248ae254b65984f286531853bedd16131e0ad8241838092dca namespace=k8s.io May 15 10:44:57.658475 env[1248]: time="2025-05-15T10:44:57.658466031Z" level=info msg="cleaning up dead shim" May 15 10:44:57.663218 env[1248]: time="2025-05-15T10:44:57.663174313Z" level=warning msg="cleanup warnings time=\"2025-05-15T10:44:57Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1773 runtime=io.containerd.runc.v2\n" May 15 10:44:58.188367 kubelet[1593]: E0515 10:44:58.188328 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:44:58.394868 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-5da799e6cc6595248ae254b65984f286531853bedd16131e0ad8241838092dca-rootfs.mount: Deactivated successfully. May 15 10:44:58.475994 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1411125653.mount: Deactivated successfully. May 15 10:44:58.941087 env[1248]: time="2025-05-15T10:44:58.940981970Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:44:58.941887 env[1248]: time="2025-05-15T10:44:58.941863354Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:608f0c8bf7f9651ca79f170235ea5eefb978a0c1da132e7477a88ad37d171ad3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:44:58.942687 env[1248]: time="2025-05-15T10:44:58.942662968Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:44:58.944148 env[1248]: time="2025-05-15T10:44:58.944115110Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:152638222ecf265eb8e5352e3c50e8fc520994e8ffcff1ee1490c975f7fc2b36,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:44:58.944366 env[1248]: time="2025-05-15T10:44:58.944345752Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.4\" returns image reference \"sha256:608f0c8bf7f9651ca79f170235ea5eefb978a0c1da132e7477a88ad37d171ad3\"" May 15 10:44:58.945840 env[1248]: time="2025-05-15T10:44:58.945824208Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 15 10:44:58.946633 env[1248]: time="2025-05-15T10:44:58.946607377Z" level=info msg="CreateContainer within sandbox \"6ec182929d94af44921a98e85d9b5881d1fe08808f590f2b58d6bbbbb6684a4e\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 15 10:44:58.956760 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2242485924.mount: Deactivated successfully. May 15 10:44:58.968238 env[1248]: time="2025-05-15T10:44:58.968188704Z" level=info msg="CreateContainer within sandbox \"6ec182929d94af44921a98e85d9b5881d1fe08808f590f2b58d6bbbbb6684a4e\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"0ff656dc122aec1692003c4b0ad8d9ef3ea839882c6eb1beb2bd090f8b88f4be\"" May 15 10:44:58.968771 env[1248]: time="2025-05-15T10:44:58.968732182Z" level=info msg="StartContainer for \"0ff656dc122aec1692003c4b0ad8d9ef3ea839882c6eb1beb2bd090f8b88f4be\"" May 15 10:44:58.981325 systemd[1]: Started cri-containerd-0ff656dc122aec1692003c4b0ad8d9ef3ea839882c6eb1beb2bd090f8b88f4be.scope. May 15 10:44:58.992000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:58.992000 audit[1798]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f543e946018 items=0 ppid=1660 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:58.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066663635366463313232616563313639323030336334623061643864 May 15 10:44:58.992000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:58.992000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:58.992000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:58.992000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:58.992000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:58.992000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:58.992000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:58.992000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:58.992000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:58.992000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:58.992000 audit: BPF prog-id=72 op=LOAD May 15 10:44:58.992000 audit[1798]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001fb5f8 items=0 ppid=1660 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:58.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066663635366463313232616563313639323030336334623061643864 May 15 10:44:58.993000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:58.993000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:58.993000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:58.993000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:58.993000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:58.993000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:58.993000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:58.993000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:58.993000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:58.993000 audit: BPF prog-id=73 op=LOAD May 15 10:44:58.993000 audit[1798]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001fb648 items=0 ppid=1660 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:58.993000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066663635366463313232616563313639323030336334623061643864 May 15 10:44:58.993000 audit: BPF prog-id=73 op=UNLOAD May 15 10:44:58.993000 audit: BPF prog-id=72 op=UNLOAD May 15 10:44:58.993000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:58.993000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:58.993000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:58.993000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:58.993000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:58.993000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:58.993000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:58.993000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:58.993000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:58.993000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:44:58.993000 audit: BPF prog-id=74 op=LOAD May 15 10:44:58.993000 audit[1798]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001fb6d8 items=0 ppid=1660 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:58.993000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066663635366463313232616563313639323030336334623061643864 May 15 10:44:59.006140 env[1248]: time="2025-05-15T10:44:59.006105892Z" level=info msg="StartContainer for \"0ff656dc122aec1692003c4b0ad8d9ef3ea839882c6eb1beb2bd090f8b88f4be\" returns successfully" May 15 10:44:59.080000 audit[1858]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1858 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:44:59.080000 audit[1858]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff3385b9e0 a2=0 a3=7fff3385b9cc items=0 ppid=1809 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:59.080000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 15 10:44:59.080000 audit[1860]: NETFILTER_CFG table=nat:15 family=2 entries=1 op=nft_register_chain pid=1860 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:44:59.080000 audit[1860]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd47893010 a2=0 a3=7ffd47892ffc items=0 ppid=1809 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:59.080000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 15 10:44:59.081000 audit[1859]: NETFILTER_CFG table=mangle:16 family=10 entries=1 op=nft_register_chain pid=1859 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:44:59.081000 audit[1859]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdd6897b30 a2=0 a3=7ffdd6897b1c items=0 ppid=1809 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:59.081000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 15 10:44:59.081000 audit[1861]: NETFILTER_CFG table=filter:17 family=2 entries=1 op=nft_register_chain pid=1861 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:44:59.081000 audit[1861]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdb41bde10 a2=0 a3=7ffdb41bddfc items=0 ppid=1809 pid=1861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:59.081000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 15 10:44:59.082000 audit[1862]: NETFILTER_CFG table=nat:18 family=10 entries=1 op=nft_register_chain pid=1862 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:44:59.082000 audit[1862]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeae333330 a2=0 a3=7ffeae33331c items=0 ppid=1809 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:59.082000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 15 10:44:59.083000 audit[1863]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1863 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:44:59.083000 audit[1863]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe502e0270 a2=0 a3=7ffe502e025c items=0 ppid=1809 pid=1863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:59.083000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 15 10:44:59.181000 audit[1864]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1864 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:44:59.181000 audit[1864]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fffd89c2820 a2=0 a3=7fffd89c280c items=0 ppid=1809 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:59.181000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 15 10:44:59.183000 audit[1866]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1866 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:44:59.183000 audit[1866]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffdb28fd100 a2=0 a3=7ffdb28fd0ec items=0 ppid=1809 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:59.183000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 15 10:44:59.185000 audit[1869]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1869 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:44:59.185000 audit[1869]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fffcbd6b4a0 a2=0 a3=7fffcbd6b48c items=0 ppid=1809 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:59.185000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 15 10:44:59.186000 audit[1870]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1870 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:44:59.186000 audit[1870]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff4626f660 a2=0 a3=7fff4626f64c items=0 ppid=1809 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:59.186000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 15 10:44:59.188627 kubelet[1593]: E0515 10:44:59.188594 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:44:59.188000 audit[1872]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1872 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:44:59.188000 audit[1872]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcee59dac0 a2=0 a3=7ffcee59daac items=0 ppid=1809 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:59.188000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 15 10:44:59.188000 audit[1873]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1873 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:44:59.188000 audit[1873]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff6b5f31f0 a2=0 a3=7fff6b5f31dc items=0 ppid=1809 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:59.188000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 15 10:44:59.190000 audit[1875]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1875 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:44:59.190000 audit[1875]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffea60e6940 a2=0 a3=7ffea60e692c items=0 ppid=1809 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:59.190000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 15 10:44:59.193000 audit[1878]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1878 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:44:59.193000 audit[1878]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe76d4f0c0 a2=0 a3=7ffe76d4f0ac items=0 ppid=1809 pid=1878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:59.193000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 15 10:44:59.193000 audit[1879]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1879 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:44:59.193000 audit[1879]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffde1d06a60 a2=0 a3=7ffde1d06a4c items=0 ppid=1809 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:59.193000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 15 10:44:59.195000 audit[1881]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1881 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:44:59.195000 audit[1881]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff8509fc20 a2=0 a3=7fff8509fc0c items=0 ppid=1809 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:59.195000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 15 10:44:59.195000 audit[1882]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1882 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:44:59.195000 audit[1882]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdfca9cfa0 a2=0 a3=7ffdfca9cf8c items=0 ppid=1809 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:59.195000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 15 10:44:59.197000 audit[1884]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1884 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:44:59.197000 audit[1884]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe448c6040 a2=0 a3=7ffe448c602c items=0 ppid=1809 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:59.197000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 10:44:59.199000 audit[1887]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1887 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:44:59.199000 audit[1887]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff7f533d50 a2=0 a3=7fff7f533d3c items=0 ppid=1809 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:59.199000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 10:44:59.202000 audit[1890]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1890 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:44:59.202000 audit[1890]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff9d6f02e0 a2=0 a3=7fff9d6f02cc items=0 ppid=1809 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:59.202000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 15 10:44:59.203000 audit[1891]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1891 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:44:59.203000 audit[1891]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdf1293570 a2=0 a3=7ffdf129355c items=0 ppid=1809 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:59.203000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 15 10:44:59.204000 audit[1893]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1893 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:44:59.204000 audit[1893]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fffa67571b0 a2=0 a3=7fffa675719c items=0 ppid=1809 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:59.204000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 10:44:59.231000 audit[1897]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1897 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:44:59.231000 audit[1897]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd36158580 a2=0 a3=7ffd3615856c items=0 ppid=1809 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:59.231000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 10:44:59.232000 audit[1898]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1898 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:44:59.232000 audit[1898]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffd7a71690 a2=0 a3=7fffd7a7167c items=0 ppid=1809 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:59.232000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 15 10:44:59.233000 audit[1900]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1900 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:44:59.233000 audit[1900]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc3b5385f0 a2=0 a3=7ffc3b5385dc items=0 ppid=1809 pid=1900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:59.233000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 15 10:44:59.244000 audit[1906]: NETFILTER_CFG table=filter:39 family=2 entries=5 op=nft_register_rule pid=1906 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:44:59.244000 audit[1906]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffe181d9c40 a2=0 a3=7ffe181d9c2c items=0 ppid=1809 pid=1906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:59.244000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:44:59.285000 audit[1906]: NETFILTER_CFG table=nat:40 family=2 entries=65 op=nft_register_chain pid=1906 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:44:59.285000 audit[1906]: SYSCALL arch=c000003e syscall=46 success=yes exit=30940 a0=3 a1=7ffe181d9c40 a2=0 a3=7ffe181d9c2c items=0 ppid=1809 pid=1906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:59.285000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:44:59.292000 audit[1914]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1914 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:44:59.292000 audit[1914]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc4c9d76d0 a2=0 a3=7ffc4c9d76bc items=0 ppid=1809 pid=1914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:59.292000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 15 10:44:59.293000 audit[1916]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1916 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:44:59.293000 audit[1916]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc7fa91f90 a2=0 a3=7ffc7fa91f7c items=0 ppid=1809 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:59.293000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 15 10:44:59.296000 audit[1919]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1919 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:44:59.296000 audit[1919]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe0221d580 a2=0 a3=7ffe0221d56c items=0 ppid=1809 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:59.296000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 15 10:44:59.296000 audit[1920]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1920 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:44:59.296000 audit[1920]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc0f984e70 a2=0 a3=7ffc0f984e5c items=0 ppid=1809 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:59.296000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 15 10:44:59.298000 audit[1922]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1922 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:44:59.298000 audit[1922]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd3d11af10 a2=0 a3=7ffd3d11aefc items=0 ppid=1809 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:59.298000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 15 10:44:59.298000 audit[1923]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1923 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:44:59.298000 audit[1923]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffdd702060 a2=0 a3=7fffdd70204c items=0 ppid=1809 pid=1923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:59.298000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 15 10:44:59.300000 audit[1925]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1925 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:44:59.300000 audit[1925]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe9c8e7990 a2=0 a3=7ffe9c8e797c items=0 ppid=1809 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:59.300000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 15 10:44:59.302000 audit[1928]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1928 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:44:59.302000 audit[1928]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd9cb30200 a2=0 a3=7ffd9cb301ec items=0 ppid=1809 pid=1928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:59.302000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 15 10:44:59.304000 audit[1929]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1929 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:44:59.304000 audit[1929]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc6b5a2330 a2=0 a3=7ffc6b5a231c items=0 ppid=1809 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:59.304000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 15 10:44:59.305000 audit[1931]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1931 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:44:59.305000 audit[1931]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdfdbc92c0 a2=0 a3=7ffdfdbc92ac items=0 ppid=1809 pid=1931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:59.305000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 15 10:44:59.306000 audit[1932]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1932 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:44:59.306000 audit[1932]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd8c760320 a2=0 a3=7ffd8c76030c items=0 ppid=1809 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:59.306000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 15 10:44:59.308951 kubelet[1593]: E0515 10:44:59.308751 1593 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ltzxd" podUID="9e0bf444-ae9d-48a1-95c6-b12cd232dbd4" May 15 10:44:59.309000 audit[1934]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1934 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:44:59.309000 audit[1934]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd1569b2a0 a2=0 a3=7ffd1569b28c items=0 ppid=1809 pid=1934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:59.309000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 10:44:59.312000 audit[1937]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1937 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:44:59.312000 audit[1937]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc2be2a120 a2=0 a3=7ffc2be2a10c items=0 ppid=1809 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:59.312000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 15 10:44:59.315000 audit[1940]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1940 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:44:59.315000 audit[1940]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc0fc93050 a2=0 a3=7ffc0fc9303c items=0 ppid=1809 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:59.315000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 15 10:44:59.316000 audit[1941]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1941 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:44:59.316000 audit[1941]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc69403310 a2=0 a3=7ffc694032fc items=0 ppid=1809 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:59.316000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 15 10:44:59.318000 audit[1943]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1943 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:44:59.318000 audit[1943]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff1f3a4f40 a2=0 a3=7fff1f3a4f2c items=0 ppid=1809 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:59.318000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 10:44:59.320000 audit[1946]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1946 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:44:59.320000 audit[1946]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe2df71910 a2=0 a3=7ffe2df718fc items=0 ppid=1809 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:59.320000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 10:44:59.321000 audit[1947]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1947 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:44:59.321000 audit[1947]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcadae62e0 a2=0 a3=7ffcadae62cc items=0 ppid=1809 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:59.321000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 15 10:44:59.323000 audit[1949]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1949 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:44:59.323000 audit[1949]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe7c3738b0 a2=0 a3=7ffe7c37389c items=0 ppid=1809 pid=1949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:59.323000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 15 10:44:59.324000 audit[1950]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1950 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:44:59.324000 audit[1950]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc51b2c920 a2=0 a3=7ffc51b2c90c items=0 ppid=1809 pid=1950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:59.324000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 15 10:44:59.327149 kubelet[1593]: I0515 10:44:59.327055 1593 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-jnjt2" podStartSLOduration=3.509811057 podStartE2EDuration="6.327041121s" podCreationTimestamp="2025-05-15 10:44:53 +0000 UTC" firstStartedPulling="2025-05-15 10:44:56.128004532 +0000 UTC m=+3.388254332" lastFinishedPulling="2025-05-15 10:44:58.945234593 +0000 UTC m=+6.205484396" observedRunningTime="2025-05-15 10:44:59.323302747 +0000 UTC m=+6.583552559" watchObservedRunningTime="2025-05-15 10:44:59.327041121 +0000 UTC m=+6.587290938" May 15 10:44:59.327000 audit[1952]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1952 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:44:59.327000 audit[1952]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffda3b64720 a2=0 a3=7ffda3b6470c items=0 ppid=1809 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:59.327000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 10:44:59.329000 audit[1955]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1955 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:44:59.329000 audit[1955]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff19b3cad0 a2=0 a3=7fff19b3cabc items=0 ppid=1809 pid=1955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:59.329000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 10:44:59.331000 audit[1957]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1957 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 15 10:44:59.331000 audit[1957]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffc48c698f0 a2=0 a3=7ffc48c698dc items=0 ppid=1809 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:59.331000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:44:59.331000 audit[1957]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1957 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 15 10:44:59.331000 audit[1957]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffc48c698f0 a2=0 a3=7ffc48c698dc items=0 ppid=1809 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:44:59.331000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:44:59.394903 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1038726657.mount: Deactivated successfully. May 15 10:45:00.188899 kubelet[1593]: E0515 10:45:00.188865 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:01.189338 kubelet[1593]: E0515 10:45:01.189308 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:01.309164 kubelet[1593]: E0515 10:45:01.309139 1593 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ltzxd" podUID="9e0bf444-ae9d-48a1-95c6-b12cd232dbd4" May 15 10:45:02.189727 kubelet[1593]: E0515 10:45:02.189677 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:03.190291 kubelet[1593]: E0515 10:45:03.190254 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:03.309950 kubelet[1593]: E0515 10:45:03.309737 1593 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ltzxd" podUID="9e0bf444-ae9d-48a1-95c6-b12cd232dbd4" May 15 10:45:03.778599 env[1248]: time="2025-05-15T10:45:03.778410331Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:45:03.789350 env[1248]: time="2025-05-15T10:45:03.789327816Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:45:03.792589 env[1248]: time="2025-05-15T10:45:03.792567672Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:45:03.803276 env[1248]: time="2025-05-15T10:45:03.803254903Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:45:03.803731 env[1248]: time="2025-05-15T10:45:03.803709815Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9\"" May 15 10:45:03.805712 env[1248]: time="2025-05-15T10:45:03.805692495Z" level=info msg="CreateContainer within sandbox \"7296d85ed8c2745be08ee34a52751dc40dc00bd956c03414c6e76cf702bd57a1\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 15 10:45:03.849066 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3481452244.mount: Deactivated successfully. May 15 10:45:03.881992 env[1248]: time="2025-05-15T10:45:03.881958642Z" level=info msg="CreateContainer within sandbox \"7296d85ed8c2745be08ee34a52751dc40dc00bd956c03414c6e76cf702bd57a1\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"9e9eef69a62595c6783d879b13d25ba3c4bb53b46baa362e7495e483b6aecfe9\"" May 15 10:45:03.882720 env[1248]: time="2025-05-15T10:45:03.882701041Z" level=info msg="StartContainer for \"9e9eef69a62595c6783d879b13d25ba3c4bb53b46baa362e7495e483b6aecfe9\"" May 15 10:45:03.896660 systemd[1]: Started cri-containerd-9e9eef69a62595c6783d879b13d25ba3c4bb53b46baa362e7495e483b6aecfe9.scope. May 15 10:45:03.900889 systemd[1]: run-containerd-runc-k8s.io-9e9eef69a62595c6783d879b13d25ba3c4bb53b46baa362e7495e483b6aecfe9-runc.Zhd8tU.mount: Deactivated successfully. May 15 10:45:03.908000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:03.910573 kernel: kauditd_printk_skb: 230 callbacks suppressed May 15 10:45:03.910613 kernel: audit: type=1400 audit(1747305903.908:528): avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:03.908000 audit[1966]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7f7f783058c8 items=0 ppid=1659 pid=1966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:03.916666 kernel: audit: type=1300 audit(1747305903.908:528): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7f7f783058c8 items=0 ppid=1659 pid=1966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:03.916700 kernel: audit: type=1327 audit(1747305903.908:528): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965396565663639613632353935633637383364383739623133643235 May 15 10:45:03.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965396565663639613632353935633637383364383739623133643235 May 15 10:45:03.908000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:03.922326 kernel: audit: type=1400 audit(1747305903.908:529): avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:03.922356 kernel: audit: type=1400 audit(1747305903.908:529): avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:03.908000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:03.908000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:03.927023 kernel: audit: type=1400 audit(1747305903.908:529): avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:03.927051 kernel: audit: type=1400 audit(1747305903.908:529): avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:03.908000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:03.908000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:03.931824 kernel: audit: type=1400 audit(1747305903.908:529): avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:03.908000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:03.934377 kernel: audit: type=1400 audit(1747305903.908:529): avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:03.908000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:03.936910 kernel: audit: type=1400 audit(1747305903.908:529): avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:03.908000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:03.908000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:03.908000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:03.908000 audit: BPF prog-id=75 op=LOAD May 15 10:45:03.908000 audit[1966]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001499d8 a2=78 a3=c0003c42a8 items=0 ppid=1659 pid=1966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:03.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965396565663639613632353935633637383364383739623133643235 May 15 10:45:03.911000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:03.911000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:03.911000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:03.911000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:03.911000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:03.911000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:03.911000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:03.911000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:03.911000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:03.911000 audit: BPF prog-id=76 op=LOAD May 15 10:45:03.911000 audit[1966]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000149770 a2=78 a3=c0003c42f8 items=0 ppid=1659 pid=1966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:03.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965396565663639613632353935633637383364383739623133643235 May 15 10:45:03.918000 audit: BPF prog-id=76 op=UNLOAD May 15 10:45:03.918000 audit: BPF prog-id=75 op=UNLOAD May 15 10:45:03.918000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:03.918000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:03.918000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:03.918000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:03.918000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:03.918000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:03.918000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:03.918000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:03.918000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:03.918000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:03.918000 audit: BPF prog-id=77 op=LOAD May 15 10:45:03.918000 audit[1966]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000149c30 a2=78 a3=c0003c4388 items=0 ppid=1659 pid=1966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:03.918000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965396565663639613632353935633637383364383739623133643235 May 15 10:45:03.947126 env[1248]: time="2025-05-15T10:45:03.947103234Z" level=info msg="StartContainer for \"9e9eef69a62595c6783d879b13d25ba3c4bb53b46baa362e7495e483b6aecfe9\" returns successfully" May 15 10:45:04.190900 kubelet[1593]: E0515 10:45:04.190768 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:05.141107 env[1248]: time="2025-05-15T10:45:05.141060105Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 15 10:45:05.142667 systemd[1]: cri-containerd-9e9eef69a62595c6783d879b13d25ba3c4bb53b46baa362e7495e483b6aecfe9.scope: Deactivated successfully. May 15 10:45:05.145000 audit: BPF prog-id=77 op=UNLOAD May 15 10:45:05.151551 kubelet[1593]: I0515 10:45:05.151532 1593 kubelet_node_status.go:502] "Fast updating node status as it just became ready" May 15 10:45:05.155088 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-9e9eef69a62595c6783d879b13d25ba3c4bb53b46baa362e7495e483b6aecfe9-rootfs.mount: Deactivated successfully. May 15 10:45:05.191709 kubelet[1593]: E0515 10:45:05.191673 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:05.312533 systemd[1]: Created slice kubepods-besteffort-pod9e0bf444_ae9d_48a1_95c6_b12cd232dbd4.slice. May 15 10:45:05.314682 env[1248]: time="2025-05-15T10:45:05.314660471Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ltzxd,Uid:9e0bf444-ae9d-48a1-95c6-b12cd232dbd4,Namespace:calico-system,Attempt:0,}" May 15 10:45:05.418111 env[1248]: time="2025-05-15T10:45:05.417896797Z" level=info msg="shim disconnected" id=9e9eef69a62595c6783d879b13d25ba3c4bb53b46baa362e7495e483b6aecfe9 May 15 10:45:05.418302 env[1248]: time="2025-05-15T10:45:05.418288781Z" level=warning msg="cleaning up after shim disconnected" id=9e9eef69a62595c6783d879b13d25ba3c4bb53b46baa362e7495e483b6aecfe9 namespace=k8s.io May 15 10:45:05.418370 env[1248]: time="2025-05-15T10:45:05.418361001Z" level=info msg="cleaning up dead shim" May 15 10:45:05.424481 env[1248]: time="2025-05-15T10:45:05.424448013Z" level=warning msg="cleanup warnings time=\"2025-05-15T10:45:05Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2016 runtime=io.containerd.runc.v2\n" May 15 10:45:05.438877 env[1248]: time="2025-05-15T10:45:05.438837393Z" level=error msg="Failed to destroy network for sandbox \"a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:45:05.439899 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8-shm.mount: Deactivated successfully. May 15 10:45:05.440566 env[1248]: time="2025-05-15T10:45:05.440543947Z" level=error msg="encountered an error cleaning up failed sandbox \"a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:45:05.440645 env[1248]: time="2025-05-15T10:45:05.440628780Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ltzxd,Uid:9e0bf444-ae9d-48a1-95c6-b12cd232dbd4,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:45:05.440867 kubelet[1593]: E0515 10:45:05.440841 1593 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:45:05.440910 kubelet[1593]: E0515 10:45:05.440888 1593 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-ltzxd" May 15 10:45:05.440936 kubelet[1593]: E0515 10:45:05.440905 1593 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-ltzxd" May 15 10:45:05.440960 kubelet[1593]: E0515 10:45:05.440941 1593 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-ltzxd_calico-system(9e0bf444-ae9d-48a1-95c6-b12cd232dbd4)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-ltzxd_calico-system(9e0bf444-ae9d-48a1-95c6-b12cd232dbd4)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-ltzxd" podUID="9e0bf444-ae9d-48a1-95c6-b12cd232dbd4" May 15 10:45:06.192228 kubelet[1593]: E0515 10:45:06.192165 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:06.260095 update_engine[1239]: I0515 10:45:06.259856 1239 update_attempter.cc:509] Updating boot flags... May 15 10:45:06.329611 kubelet[1593]: I0515 10:45:06.329276 1593 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8" May 15 10:45:06.329747 env[1248]: time="2025-05-15T10:45:06.329726875Z" level=info msg="StopPodSandbox for \"a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8\"" May 15 10:45:06.331912 env[1248]: time="2025-05-15T10:45:06.331415350Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 15 10:45:06.346522 env[1248]: time="2025-05-15T10:45:06.346483326Z" level=error msg="StopPodSandbox for \"a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8\" failed" error="failed to destroy network for sandbox \"a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:45:06.346672 kubelet[1593]: E0515 10:45:06.346639 1593 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8" May 15 10:45:06.346716 kubelet[1593]: E0515 10:45:06.346686 1593 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8"} May 15 10:45:06.346738 kubelet[1593]: E0515 10:45:06.346732 1593 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9e0bf444-ae9d-48a1-95c6-b12cd232dbd4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:45:06.346785 kubelet[1593]: E0515 10:45:06.346746 1593 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9e0bf444-ae9d-48a1-95c6-b12cd232dbd4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-ltzxd" podUID="9e0bf444-ae9d-48a1-95c6-b12cd232dbd4" May 15 10:45:07.192661 kubelet[1593]: E0515 10:45:07.192618 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:08.193101 kubelet[1593]: E0515 10:45:08.193065 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:09.193716 kubelet[1593]: E0515 10:45:09.193682 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:10.194676 kubelet[1593]: E0515 10:45:10.194644 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:11.157231 systemd[1]: Created slice kubepods-besteffort-pod761f3c7f_9dda_42c0_a797_28c5ac5e3509.slice. May 15 10:45:11.195517 kubelet[1593]: E0515 10:45:11.195489 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:11.208764 kubelet[1593]: I0515 10:45:11.208732 1593 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nzpgp\" (UniqueName: \"kubernetes.io/projected/761f3c7f-9dda-42c0-a797-28c5ac5e3509-kube-api-access-nzpgp\") pod \"nginx-deployment-7fcdb87857-xl57b\" (UID: \"761f3c7f-9dda-42c0-a797-28c5ac5e3509\") " pod="default/nginx-deployment-7fcdb87857-xl57b" May 15 10:45:11.460170 env[1248]: time="2025-05-15T10:45:11.460046230Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-xl57b,Uid:761f3c7f-9dda-42c0-a797-28c5ac5e3509,Namespace:default,Attempt:0,}" May 15 10:45:11.558076 env[1248]: time="2025-05-15T10:45:11.558029295Z" level=error msg="Failed to destroy network for sandbox \"9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:45:11.559276 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765-shm.mount: Deactivated successfully. May 15 10:45:11.560143 env[1248]: time="2025-05-15T10:45:11.560109075Z" level=error msg="encountered an error cleaning up failed sandbox \"9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:45:11.560271 env[1248]: time="2025-05-15T10:45:11.560246088Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-xl57b,Uid:761f3c7f-9dda-42c0-a797-28c5ac5e3509,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:45:11.560548 kubelet[1593]: E0515 10:45:11.560521 1593 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:45:11.560607 kubelet[1593]: E0515 10:45:11.560562 1593 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-xl57b" May 15 10:45:11.560607 kubelet[1593]: E0515 10:45:11.560578 1593 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-xl57b" May 15 10:45:11.560678 kubelet[1593]: E0515 10:45:11.560613 1593 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-7fcdb87857-xl57b_default(761f3c7f-9dda-42c0-a797-28c5ac5e3509)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-7fcdb87857-xl57b_default(761f3c7f-9dda-42c0-a797-28c5ac5e3509)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-xl57b" podUID="761f3c7f-9dda-42c0-a797-28c5ac5e3509" May 15 10:45:12.196328 kubelet[1593]: E0515 10:45:12.196302 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:12.338008 kubelet[1593]: I0515 10:45:12.337706 1593 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765" May 15 10:45:12.338178 env[1248]: time="2025-05-15T10:45:12.338159941Z" level=info msg="StopPodSandbox for \"9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765\"" May 15 10:45:12.378752 env[1248]: time="2025-05-15T10:45:12.378717417Z" level=error msg="StopPodSandbox for \"9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765\" failed" error="failed to destroy network for sandbox \"9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:45:12.379075 kubelet[1593]: E0515 10:45:12.378958 1593 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765" May 15 10:45:12.379075 kubelet[1593]: E0515 10:45:12.379007 1593 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765"} May 15 10:45:12.379075 kubelet[1593]: E0515 10:45:12.379032 1593 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"761f3c7f-9dda-42c0-a797-28c5ac5e3509\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:45:12.379075 kubelet[1593]: E0515 10:45:12.379047 1593 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"761f3c7f-9dda-42c0-a797-28c5ac5e3509\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-xl57b" podUID="761f3c7f-9dda-42c0-a797-28c5ac5e3509" May 15 10:45:13.075097 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3425026557.mount: Deactivated successfully. May 15 10:45:13.094825 env[1248]: time="2025-05-15T10:45:13.094794626Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:45:13.095627 env[1248]: time="2025-05-15T10:45:13.095611004Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:45:13.096454 env[1248]: time="2025-05-15T10:45:13.096438962Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:45:13.097231 env[1248]: time="2025-05-15T10:45:13.097216300Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:45:13.097491 env[1248]: time="2025-05-15T10:45:13.097473147Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae\"" May 15 10:45:13.106561 env[1248]: time="2025-05-15T10:45:13.106534785Z" level=info msg="CreateContainer within sandbox \"7296d85ed8c2745be08ee34a52751dc40dc00bd956c03414c6e76cf702bd57a1\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 15 10:45:13.112410 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3177446232.mount: Deactivated successfully. May 15 10:45:13.128345 env[1248]: time="2025-05-15T10:45:13.128308091Z" level=info msg="CreateContainer within sandbox \"7296d85ed8c2745be08ee34a52751dc40dc00bd956c03414c6e76cf702bd57a1\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"58548b72a348b24cef7de73402d088e128356e4fd877ec05c176bdf4d8a7281c\"" May 15 10:45:13.128892 env[1248]: time="2025-05-15T10:45:13.128878025Z" level=info msg="StartContainer for \"58548b72a348b24cef7de73402d088e128356e4fd877ec05c176bdf4d8a7281c\"" May 15 10:45:13.139016 systemd[1]: Started cri-containerd-58548b72a348b24cef7de73402d088e128356e4fd877ec05c176bdf4d8a7281c.scope. May 15 10:45:13.151000 audit[2151]: AVC avc: denied { perfmon } for pid=2151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:13.153826 kernel: kauditd_printk_skb: 34 callbacks suppressed May 15 10:45:13.153863 kernel: audit: type=1400 audit(1747305913.151:535): avc: denied { perfmon } for pid=2151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:13.151000 audit[2151]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7f18ccf3e7c8 items=0 ppid=1659 pid=2151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:13.159922 kernel: audit: type=1300 audit(1747305913.151:535): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7f18ccf3e7c8 items=0 ppid=1659 pid=2151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:13.159960 kernel: audit: type=1327 audit(1747305913.151:535): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538353438623732613334386232346365663764653733343032643038 May 15 10:45:13.151000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538353438623732613334386232346365663764653733343032643038 May 15 10:45:13.163225 kernel: audit: type=1400 audit(1747305913.152:536): avc: denied { bpf } for pid=2151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:13.152000 audit[2151]: AVC avc: denied { bpf } for pid=2151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:13.165534 kernel: audit: type=1400 audit(1747305913.152:536): avc: denied { bpf } for pid=2151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:13.152000 audit[2151]: AVC avc: denied { bpf } for pid=2151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:13.167894 kernel: audit: type=1400 audit(1747305913.152:536): avc: denied { bpf } for pid=2151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:13.152000 audit[2151]: AVC avc: denied { bpf } for pid=2151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:13.152000 audit[2151]: AVC avc: denied { perfmon } for pid=2151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:13.172783 kernel: audit: type=1400 audit(1747305913.152:536): avc: denied { perfmon } for pid=2151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:13.172831 kernel: audit: type=1400 audit(1747305913.152:536): avc: denied { perfmon } for pid=2151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:13.152000 audit[2151]: AVC avc: denied { perfmon } for pid=2151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:13.152000 audit[2151]: AVC avc: denied { perfmon } for pid=2151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:13.152000 audit[2151]: AVC avc: denied { perfmon } for pid=2151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:13.180512 kernel: audit: type=1400 audit(1747305913.152:536): avc: denied { perfmon } for pid=2151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:13.180561 kernel: audit: type=1400 audit(1747305913.152:536): avc: denied { perfmon } for pid=2151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:13.180576 kubelet[1593]: E0515 10:45:13.180464 1593 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:13.152000 audit[2151]: AVC avc: denied { perfmon } for pid=2151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:13.152000 audit[2151]: AVC avc: denied { bpf } for pid=2151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:13.152000 audit[2151]: AVC avc: denied { bpf } for pid=2151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:13.152000 audit: BPF prog-id=78 op=LOAD May 15 10:45:13.152000 audit[2151]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001499d8 a2=78 a3=c0002b7bd8 items=0 ppid=1659 pid=2151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:13.152000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538353438623732613334386232346365663764653733343032643038 May 15 10:45:13.158000 audit[2151]: AVC avc: denied { bpf } for pid=2151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:13.158000 audit[2151]: AVC avc: denied { bpf } for pid=2151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:13.158000 audit[2151]: AVC avc: denied { perfmon } for pid=2151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:13.158000 audit[2151]: AVC avc: denied { perfmon } for pid=2151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:13.158000 audit[2151]: AVC avc: denied { perfmon } for pid=2151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:13.158000 audit[2151]: AVC avc: denied { perfmon } for pid=2151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:13.158000 audit[2151]: AVC avc: denied { perfmon } for pid=2151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:13.158000 audit[2151]: AVC avc: denied { bpf } for pid=2151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:13.158000 audit[2151]: AVC avc: denied { bpf } for pid=2151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:13.158000 audit: BPF prog-id=79 op=LOAD May 15 10:45:13.158000 audit[2151]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000149770 a2=78 a3=c0002b7c28 items=0 ppid=1659 pid=2151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:13.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538353438623732613334386232346365663764653733343032643038 May 15 10:45:13.166000 audit: BPF prog-id=79 op=UNLOAD May 15 10:45:13.166000 audit: BPF prog-id=78 op=UNLOAD May 15 10:45:13.166000 audit[2151]: AVC avc: denied { bpf } for pid=2151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:13.166000 audit[2151]: AVC avc: denied { bpf } for pid=2151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:13.166000 audit[2151]: AVC avc: denied { bpf } for pid=2151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:13.166000 audit[2151]: AVC avc: denied { perfmon } for pid=2151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:13.166000 audit[2151]: AVC avc: denied { perfmon } for pid=2151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:13.166000 audit[2151]: AVC avc: denied { perfmon } for pid=2151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:13.166000 audit[2151]: AVC avc: denied { perfmon } for pid=2151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:13.166000 audit[2151]: AVC avc: denied { perfmon } for pid=2151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:13.166000 audit[2151]: AVC avc: denied { bpf } for pid=2151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:13.166000 audit[2151]: AVC avc: denied { bpf } for pid=2151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:13.166000 audit: BPF prog-id=80 op=LOAD May 15 10:45:13.166000 audit[2151]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000149c30 a2=78 a3=c0002b7cb8 items=0 ppid=1659 pid=2151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:13.166000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538353438623732613334386232346365663764653733343032643038 May 15 10:45:13.188670 env[1248]: time="2025-05-15T10:45:13.188645557Z" level=info msg="StartContainer for \"58548b72a348b24cef7de73402d088e128356e4fd877ec05c176bdf4d8a7281c\" returns successfully" May 15 10:45:13.196479 kubelet[1593]: E0515 10:45:13.196417 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:13.246359 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 15 10:45:13.246421 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 15 10:45:14.196554 kubelet[1593]: E0515 10:45:14.196521 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:14.354171 systemd[1]: run-containerd-runc-k8s.io-58548b72a348b24cef7de73402d088e128356e4fd877ec05c176bdf4d8a7281c-runc.3UORnu.mount: Deactivated successfully. May 15 10:45:14.398000 audit[2287]: AVC avc: denied { write } for pid=2287 comm="tee" name="fd" dev="proc" ino=30340 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:45:14.398000 audit[2287]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd6bf73a2b a2=241 a3=1b6 items=1 ppid=2261 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.398000 audit: CWD cwd="/etc/service/enabled/bird/log" May 15 10:45:14.398000 audit: PATH item=0 name="/dev/fd/63" inode=30330 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:45:14.399000 audit[2292]: AVC avc: denied { write } for pid=2292 comm="tee" name="fd" dev="proc" ino=30344 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:45:14.399000 audit[2292]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcabf83a1b a2=241 a3=1b6 items=1 ppid=2260 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.399000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 15 10:45:14.400000 audit[2294]: AVC avc: denied { write } for pid=2294 comm="tee" name="fd" dev="proc" ino=30348 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:45:14.400000 audit[2294]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdc6aa9a1a a2=241 a3=1b6 items=1 ppid=2268 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.400000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 15 10:45:14.400000 audit: PATH item=0 name="/dev/fd/63" inode=30337 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:45:14.400000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:45:14.398000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:45:14.399000 audit: PATH item=0 name="/dev/fd/63" inode=30334 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:45:14.399000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:45:14.425000 audit[2330]: AVC avc: denied { write } for pid=2330 comm="tee" name="fd" dev="proc" ino=30370 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:45:14.425000 audit[2330]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd80393a2a a2=241 a3=1b6 items=1 ppid=2289 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.425000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 15 10:45:14.425000 audit: PATH item=0 name="/dev/fd/63" inode=30734 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:45:14.425000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:45:14.430000 audit[2317]: AVC avc: denied { write } for pid=2317 comm="tee" name="fd" dev="proc" ino=30740 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:45:14.430000 audit[2317]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdf91c7a2a a2=241 a3=1b6 items=1 ppid=2263 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.430000 audit: CWD cwd="/etc/service/enabled/felix/log" May 15 10:45:14.430000 audit: PATH item=0 name="/dev/fd/63" inode=30727 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:45:14.430000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:45:14.432000 audit[2335]: AVC avc: denied { write } for pid=2335 comm="tee" name="fd" dev="proc" ino=30376 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:45:14.432000 audit[2335]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcd7952a2c a2=241 a3=1b6 items=1 ppid=2274 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.432000 audit: CWD cwd="/etc/service/enabled/cni/log" May 15 10:45:14.432000 audit: PATH item=0 name="/dev/fd/63" inode=30737 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:45:14.432000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:45:14.434000 audit[2328]: AVC avc: denied { write } for pid=2328 comm="tee" name="fd" dev="proc" ino=30380 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:45:14.434000 audit[2328]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd311d4a2a a2=241 a3=1b6 items=1 ppid=2272 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.434000 audit: CWD cwd="/etc/service/enabled/confd/log" May 15 10:45:14.434000 audit: PATH item=0 name="/dev/fd/63" inode=30733 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:45:14.434000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:45:14.522000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.522000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.522000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.522000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.522000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.522000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.522000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.522000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.522000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.522000 audit: BPF prog-id=81 op=LOAD May 15 10:45:14.522000 audit[2354]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffecf043490 a2=98 a3=3 items=0 ppid=2267 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.522000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:45:14.523000 audit: BPF prog-id=81 op=UNLOAD May 15 10:45:14.523000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.523000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.523000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.523000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.523000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.523000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.523000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.523000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.523000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.523000 audit: BPF prog-id=82 op=LOAD May 15 10:45:14.523000 audit[2354]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffecf043270 a2=74 a3=540051 items=0 ppid=2267 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.523000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:45:14.523000 audit: BPF prog-id=82 op=UNLOAD May 15 10:45:14.523000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.523000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.523000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.523000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.523000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.523000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.523000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.523000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.523000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.523000 audit: BPF prog-id=83 op=LOAD May 15 10:45:14.523000 audit[2354]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffecf0432a0 a2=94 a3=2 items=0 ppid=2267 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.523000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:45:14.523000 audit: BPF prog-id=83 op=UNLOAD May 15 10:45:14.589000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.589000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.589000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.589000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.589000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.589000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.589000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.589000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.589000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.589000 audit: BPF prog-id=84 op=LOAD May 15 10:45:14.589000 audit[2354]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffecf043160 a2=40 a3=1 items=0 ppid=2267 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.589000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:45:14.589000 audit: BPF prog-id=84 op=UNLOAD May 15 10:45:14.589000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.589000 audit[2354]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffecf043230 a2=50 a3=7ffecf043310 items=0 ppid=2267 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.589000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:45:14.596000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.596000 audit[2354]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffecf043170 a2=28 a3=0 items=0 ppid=2267 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.596000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:45:14.596000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.596000 audit[2354]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffecf0431a0 a2=28 a3=0 items=0 ppid=2267 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.596000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:45:14.596000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.596000 audit[2354]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffecf0430b0 a2=28 a3=0 items=0 ppid=2267 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.596000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:45:14.596000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.596000 audit[2354]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffecf0431c0 a2=28 a3=0 items=0 ppid=2267 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.596000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:45:14.596000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.596000 audit[2354]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffecf0431a0 a2=28 a3=0 items=0 ppid=2267 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.596000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:45:14.596000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.596000 audit[2354]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffecf043190 a2=28 a3=0 items=0 ppid=2267 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.596000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:45:14.597000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.597000 audit[2354]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffecf0431c0 a2=28 a3=0 items=0 ppid=2267 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.597000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:45:14.597000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.597000 audit[2354]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffecf0431a0 a2=28 a3=0 items=0 ppid=2267 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.597000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:45:14.597000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.597000 audit[2354]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffecf0431c0 a2=28 a3=0 items=0 ppid=2267 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.597000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:45:14.597000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.597000 audit[2354]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffecf043190 a2=28 a3=0 items=0 ppid=2267 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.597000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:45:14.597000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.597000 audit[2354]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffecf043200 a2=28 a3=0 items=0 ppid=2267 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.597000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:45:14.597000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.597000 audit[2354]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffecf042fb0 a2=50 a3=1 items=0 ppid=2267 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.597000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:45:14.597000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.597000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.597000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.597000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.597000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.597000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.597000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.597000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.597000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.597000 audit: BPF prog-id=85 op=LOAD May 15 10:45:14.597000 audit[2354]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffecf042fb0 a2=94 a3=5 items=0 ppid=2267 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.597000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:45:14.598000 audit: BPF prog-id=85 op=UNLOAD May 15 10:45:14.598000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.598000 audit[2354]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffecf043060 a2=50 a3=1 items=0 ppid=2267 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.598000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:45:14.598000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.598000 audit[2354]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffecf043180 a2=4 a3=38 items=0 ppid=2267 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.598000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:45:14.598000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.598000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.598000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.598000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.598000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.598000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.598000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.598000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.598000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.598000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.598000 audit[2354]: AVC avc: denied { confidentiality } for pid=2354 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:14.598000 audit[2354]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffecf0431d0 a2=94 a3=6 items=0 ppid=2267 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.598000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:45:14.599000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.599000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.599000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.599000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.599000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.599000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.599000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.599000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.599000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.599000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.599000 audit[2354]: AVC avc: denied { confidentiality } for pid=2354 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:14.599000 audit[2354]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffecf042980 a2=94 a3=83 items=0 ppid=2267 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.599000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:45:14.599000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.599000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.599000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.599000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.599000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.599000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.599000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.599000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.599000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.599000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.599000 audit[2354]: AVC avc: denied { confidentiality } for pid=2354 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:14.599000 audit[2354]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffecf042980 a2=94 a3=83 items=0 ppid=2267 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.599000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:45:14.605000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.605000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.605000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.605000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.605000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.605000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.605000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.605000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.605000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.605000 audit: BPF prog-id=86 op=LOAD May 15 10:45:14.605000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcc2291cf0 a2=98 a3=1999999999999999 items=0 ppid=2267 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.605000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 10:45:14.605000 audit: BPF prog-id=86 op=UNLOAD May 15 10:45:14.605000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.605000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.605000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.605000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.605000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.605000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.605000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.605000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.605000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.605000 audit: BPF prog-id=87 op=LOAD May 15 10:45:14.605000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcc2291bd0 a2=74 a3=ffff items=0 ppid=2267 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.605000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 10:45:14.605000 audit: BPF prog-id=87 op=UNLOAD May 15 10:45:14.605000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.605000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.605000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.605000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.605000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.605000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.605000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.605000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.605000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.605000 audit: BPF prog-id=88 op=LOAD May 15 10:45:14.605000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcc2291c10 a2=40 a3=7ffcc2291df0 items=0 ppid=2267 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.605000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 10:45:14.606000 audit: BPF prog-id=88 op=UNLOAD May 15 10:45:14.776242 systemd-networkd[1064]: vxlan.calico: Link UP May 15 10:45:14.776246 systemd-networkd[1064]: vxlan.calico: Gained carrier May 15 10:45:14.798000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.798000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.798000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.798000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.798000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.798000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.798000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.798000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.798000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.798000 audit: BPF prog-id=89 op=LOAD May 15 10:45:14.798000 audit[2407]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff46288b00 a2=98 a3=ffffffff items=0 ppid=2267 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.798000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:45:14.798000 audit: BPF prog-id=89 op=UNLOAD May 15 10:45:14.798000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.798000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.798000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.798000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.798000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.798000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.798000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.798000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.798000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.798000 audit: BPF prog-id=90 op=LOAD May 15 10:45:14.798000 audit[2407]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff46288910 a2=74 a3=540051 items=0 ppid=2267 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.798000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:45:14.798000 audit: BPF prog-id=90 op=UNLOAD May 15 10:45:14.798000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.798000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.798000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.798000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.798000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.798000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.798000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.798000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.798000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.798000 audit: BPF prog-id=91 op=LOAD May 15 10:45:14.798000 audit[2407]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff46288940 a2=94 a3=2 items=0 ppid=2267 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.798000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:45:14.798000 audit: BPF prog-id=91 op=UNLOAD May 15 10:45:14.798000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.798000 audit[2407]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff46288810 a2=28 a3=0 items=0 ppid=2267 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.798000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:45:14.798000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.798000 audit[2407]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff46288840 a2=28 a3=0 items=0 ppid=2267 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.798000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:45:14.798000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.798000 audit[2407]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff46288750 a2=28 a3=0 items=0 ppid=2267 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.798000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:45:14.798000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.798000 audit[2407]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff46288860 a2=28 a3=0 items=0 ppid=2267 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.798000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:45:14.798000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.798000 audit[2407]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff46288840 a2=28 a3=0 items=0 ppid=2267 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.798000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:45:14.798000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.798000 audit[2407]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff46288830 a2=28 a3=0 items=0 ppid=2267 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.798000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:45:14.798000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.798000 audit[2407]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff46288860 a2=28 a3=0 items=0 ppid=2267 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.798000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:45:14.798000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.798000 audit[2407]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff46288840 a2=28 a3=0 items=0 ppid=2267 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.798000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:45:14.798000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.798000 audit[2407]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff46288860 a2=28 a3=0 items=0 ppid=2267 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.798000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:45:14.798000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.798000 audit[2407]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff46288830 a2=28 a3=0 items=0 ppid=2267 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.798000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:45:14.798000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.798000 audit[2407]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff462888a0 a2=28 a3=0 items=0 ppid=2267 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.798000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:45:14.798000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.798000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.798000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.798000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.798000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.798000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.798000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.798000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.798000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.798000 audit: BPF prog-id=92 op=LOAD May 15 10:45:14.798000 audit[2407]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff46288710 a2=40 a3=0 items=0 ppid=2267 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.798000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:45:14.798000 audit: BPF prog-id=92 op=UNLOAD May 15 10:45:14.799000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.799000 audit[2407]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fff46288700 a2=50 a3=2800 items=0 ppid=2267 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.799000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:45:14.799000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.799000 audit[2407]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fff46288700 a2=50 a3=2800 items=0 ppid=2267 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.799000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:45:14.799000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.799000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.799000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.799000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.799000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.799000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.799000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.799000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.799000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.799000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.799000 audit: BPF prog-id=93 op=LOAD May 15 10:45:14.799000 audit[2407]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff46287f20 a2=94 a3=2 items=0 ppid=2267 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.799000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:45:14.799000 audit: BPF prog-id=93 op=UNLOAD May 15 10:45:14.799000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.799000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.799000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.799000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.799000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.799000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.799000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.799000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.799000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.799000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.799000 audit: BPF prog-id=94 op=LOAD May 15 10:45:14.799000 audit[2407]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff46288020 a2=94 a3=30 items=0 ppid=2267 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.799000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:45:14.803000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.803000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.803000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.803000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.803000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.803000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.803000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.803000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.803000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.803000 audit: BPF prog-id=95 op=LOAD May 15 10:45:14.803000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff749a9cd0 a2=98 a3=0 items=0 ppid=2267 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.803000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:45:14.803000 audit: BPF prog-id=95 op=UNLOAD May 15 10:45:14.803000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.803000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.803000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.803000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.803000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.803000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.803000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.803000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.803000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.803000 audit: BPF prog-id=96 op=LOAD May 15 10:45:14.803000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff749a9ab0 a2=74 a3=540051 items=0 ppid=2267 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.803000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:45:14.803000 audit: BPF prog-id=96 op=UNLOAD May 15 10:45:14.803000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.803000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.803000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.803000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.803000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.803000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.803000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.803000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.803000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.803000 audit: BPF prog-id=97 op=LOAD May 15 10:45:14.803000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff749a9ae0 a2=94 a3=2 items=0 ppid=2267 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.803000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:45:14.803000 audit: BPF prog-id=97 op=UNLOAD May 15 10:45:14.908000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.908000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.908000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.908000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.908000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.908000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.908000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.908000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.908000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.908000 audit: BPF prog-id=98 op=LOAD May 15 10:45:14.908000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff749a99a0 a2=40 a3=1 items=0 ppid=2267 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.908000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:45:14.908000 audit: BPF prog-id=98 op=UNLOAD May 15 10:45:14.908000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.908000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff749a9a70 a2=50 a3=7fff749a9b50 items=0 ppid=2267 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.908000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:45:14.915000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.915000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff749a99b0 a2=28 a3=0 items=0 ppid=2267 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.915000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:45:14.915000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.915000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff749a99e0 a2=28 a3=0 items=0 ppid=2267 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.915000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:45:14.915000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.915000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff749a98f0 a2=28 a3=0 items=0 ppid=2267 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.915000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:45:14.915000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.915000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff749a9a00 a2=28 a3=0 items=0 ppid=2267 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.915000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:45:14.916000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.916000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff749a99e0 a2=28 a3=0 items=0 ppid=2267 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.916000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:45:14.916000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.916000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff749a99d0 a2=28 a3=0 items=0 ppid=2267 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.916000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:45:14.916000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.916000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff749a9a00 a2=28 a3=0 items=0 ppid=2267 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.916000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:45:14.916000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.916000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff749a99e0 a2=28 a3=0 items=0 ppid=2267 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.916000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:45:14.916000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.916000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff749a9a00 a2=28 a3=0 items=0 ppid=2267 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.916000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:45:14.916000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.916000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff749a99d0 a2=28 a3=0 items=0 ppid=2267 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.916000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:45:14.916000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.916000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff749a9a40 a2=28 a3=0 items=0 ppid=2267 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.916000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:45:14.916000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.916000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff749a97f0 a2=50 a3=1 items=0 ppid=2267 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.916000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:45:14.917000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.917000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.917000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.917000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.917000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.917000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.917000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.917000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.917000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.917000 audit: BPF prog-id=99 op=LOAD May 15 10:45:14.917000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff749a97f0 a2=94 a3=5 items=0 ppid=2267 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.917000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:45:14.917000 audit: BPF prog-id=99 op=UNLOAD May 15 10:45:14.917000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.917000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff749a98a0 a2=50 a3=1 items=0 ppid=2267 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.917000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:45:14.917000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.917000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff749a99c0 a2=4 a3=38 items=0 ppid=2267 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.917000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:45:14.917000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.917000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.917000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.917000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.917000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.917000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.917000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.917000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.917000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.917000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.917000 audit[2409]: AVC avc: denied { confidentiality } for pid=2409 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:14.917000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff749a9a10 a2=94 a3=6 items=0 ppid=2267 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.917000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:45:14.918000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.918000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.918000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.918000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.918000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.918000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.918000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.918000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.918000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.918000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.918000 audit[2409]: AVC avc: denied { confidentiality } for pid=2409 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:14.918000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff749a91c0 a2=94 a3=83 items=0 ppid=2267 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.918000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:45:14.918000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.918000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.918000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.918000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.918000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.918000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.918000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.918000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.918000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.918000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.918000 audit[2409]: AVC avc: denied { confidentiality } for pid=2409 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:14.918000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff749a91c0 a2=94 a3=83 items=0 ppid=2267 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.918000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:45:14.919000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.919000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff749aac00 a2=10 a3=f1f00800 items=0 ppid=2267 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.919000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:45:14.919000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.919000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff749aaaa0 a2=10 a3=3 items=0 ppid=2267 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.919000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:45:14.919000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.919000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff749aaa40 a2=10 a3=3 items=0 ppid=2267 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.919000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:45:14.919000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:14.919000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff749aaa40 a2=10 a3=7 items=0 ppid=2267 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.919000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:45:14.925000 audit: BPF prog-id=94 op=UNLOAD May 15 10:45:14.959000 audit[2443]: NETFILTER_CFG table=nat:65 family=2 entries=15 op=nft_register_chain pid=2443 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:45:14.959000 audit[2443]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7fff8b3ede20 a2=0 a3=7fff8b3ede0c items=0 ppid=2267 pid=2443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.959000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:45:14.960000 audit[2446]: NETFILTER_CFG table=mangle:66 family=2 entries=16 op=nft_register_chain pid=2446 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:45:14.960000 audit[2446]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffd17a0d350 a2=0 a3=7ffd17a0d33c items=0 ppid=2267 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.960000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:45:14.963000 audit[2444]: NETFILTER_CFG table=filter:67 family=2 entries=39 op=nft_register_chain pid=2444 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:45:14.963000 audit[2444]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7fff58df8680 a2=0 a3=7fff58df866c items=0 ppid=2267 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.963000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:45:14.967000 audit[2442]: NETFILTER_CFG table=raw:68 family=2 entries=21 op=nft_register_chain pid=2442 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:45:14.967000 audit[2442]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffd2ed7a5f0 a2=0 a3=7ffd2ed7a5dc items=0 ppid=2267 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:14.967000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:45:15.197131 kubelet[1593]: E0515 10:45:15.197043 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:16.198152 kubelet[1593]: E0515 10:45:16.198115 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:16.785336 systemd-networkd[1064]: vxlan.calico: Gained IPv6LL May 15 10:45:17.198572 kubelet[1593]: E0515 10:45:17.198459 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:17.310365 env[1248]: time="2025-05-15T10:45:17.309633747Z" level=info msg="StopPodSandbox for \"a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8\"" May 15 10:45:17.376989 kubelet[1593]: I0515 10:45:17.376837 1593 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-wgkwz" podStartSLOduration=7.40269131 podStartE2EDuration="24.376814088s" podCreationTimestamp="2025-05-15 10:44:53 +0000 UTC" firstStartedPulling="2025-05-15 10:44:56.123901611 +0000 UTC m=+3.384151415" lastFinishedPulling="2025-05-15 10:45:13.098024392 +0000 UTC m=+20.358274193" observedRunningTime="2025-05-15 10:45:13.352018094 +0000 UTC m=+20.612267902" watchObservedRunningTime="2025-05-15 10:45:17.376814088 +0000 UTC m=+24.637063902" May 15 10:45:17.532259 env[1248]: 2025-05-15 10:45:17.376 [INFO][2472] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8" May 15 10:45:17.532259 env[1248]: 2025-05-15 10:45:17.377 [INFO][2472] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8" iface="eth0" netns="/var/run/netns/cni-666f548f-f1ad-dbce-b00d-89051e082e78" May 15 10:45:17.532259 env[1248]: 2025-05-15 10:45:17.377 [INFO][2472] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8" iface="eth0" netns="/var/run/netns/cni-666f548f-f1ad-dbce-b00d-89051e082e78" May 15 10:45:17.532259 env[1248]: 2025-05-15 10:45:17.379 [INFO][2472] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8" iface="eth0" netns="/var/run/netns/cni-666f548f-f1ad-dbce-b00d-89051e082e78" May 15 10:45:17.532259 env[1248]: 2025-05-15 10:45:17.379 [INFO][2472] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8" May 15 10:45:17.532259 env[1248]: 2025-05-15 10:45:17.379 [INFO][2472] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8" May 15 10:45:17.532259 env[1248]: 2025-05-15 10:45:17.520 [INFO][2479] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8" HandleID="k8s-pod-network.a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8" Workload="10.67.124.136-k8s-csi--node--driver--ltzxd-eth0" May 15 10:45:17.532259 env[1248]: 2025-05-15 10:45:17.520 [INFO][2479] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:45:17.532259 env[1248]: 2025-05-15 10:45:17.520 [INFO][2479] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:45:17.532259 env[1248]: 2025-05-15 10:45:17.528 [WARNING][2479] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8" HandleID="k8s-pod-network.a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8" Workload="10.67.124.136-k8s-csi--node--driver--ltzxd-eth0" May 15 10:45:17.532259 env[1248]: 2025-05-15 10:45:17.528 [INFO][2479] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8" HandleID="k8s-pod-network.a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8" Workload="10.67.124.136-k8s-csi--node--driver--ltzxd-eth0" May 15 10:45:17.532259 env[1248]: 2025-05-15 10:45:17.529 [INFO][2479] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:45:17.532259 env[1248]: 2025-05-15 10:45:17.531 [INFO][2472] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8" May 15 10:45:17.533668 systemd[1]: run-netns-cni\x2d666f548f\x2df1ad\x2ddbce\x2db00d\x2d89051e082e78.mount: Deactivated successfully. May 15 10:45:17.534628 env[1248]: time="2025-05-15T10:45:17.534522433Z" level=info msg="TearDown network for sandbox \"a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8\" successfully" May 15 10:45:17.534628 env[1248]: time="2025-05-15T10:45:17.534554962Z" level=info msg="StopPodSandbox for \"a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8\" returns successfully" May 15 10:45:17.535265 env[1248]: time="2025-05-15T10:45:17.535243343Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ltzxd,Uid:9e0bf444-ae9d-48a1-95c6-b12cd232dbd4,Namespace:calico-system,Attempt:1,}" May 15 10:45:17.615868 systemd-networkd[1064]: cali5b0ed8e0c57: Link UP May 15 10:45:17.617888 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 10:45:17.618173 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5b0ed8e0c57: link becomes ready May 15 10:45:17.618019 systemd-networkd[1064]: cali5b0ed8e0c57: Gained carrier May 15 10:45:17.625137 env[1248]: 2025-05-15 10:45:17.566 [INFO][2486] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.124.136-k8s-csi--node--driver--ltzxd-eth0 csi-node-driver- calico-system 9e0bf444-ae9d-48a1-95c6-b12cd232dbd4 1087 0 2025-05-15 10:44:53 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:5b5cc68cd5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.67.124.136 csi-node-driver-ltzxd eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali5b0ed8e0c57 [] []}} ContainerID="8004900860a352ad72c22d25050c2dc84ca955a63f75bdfed33dd9b739cdaa43" Namespace="calico-system" Pod="csi-node-driver-ltzxd" WorkloadEndpoint="10.67.124.136-k8s-csi--node--driver--ltzxd-" May 15 10:45:17.625137 env[1248]: 2025-05-15 10:45:17.567 [INFO][2486] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="8004900860a352ad72c22d25050c2dc84ca955a63f75bdfed33dd9b739cdaa43" Namespace="calico-system" Pod="csi-node-driver-ltzxd" WorkloadEndpoint="10.67.124.136-k8s-csi--node--driver--ltzxd-eth0" May 15 10:45:17.625137 env[1248]: 2025-05-15 10:45:17.589 [INFO][2499] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8004900860a352ad72c22d25050c2dc84ca955a63f75bdfed33dd9b739cdaa43" HandleID="k8s-pod-network.8004900860a352ad72c22d25050c2dc84ca955a63f75bdfed33dd9b739cdaa43" Workload="10.67.124.136-k8s-csi--node--driver--ltzxd-eth0" May 15 10:45:17.625137 env[1248]: 2025-05-15 10:45:17.596 [INFO][2499] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="8004900860a352ad72c22d25050c2dc84ca955a63f75bdfed33dd9b739cdaa43" HandleID="k8s-pod-network.8004900860a352ad72c22d25050c2dc84ca955a63f75bdfed33dd9b739cdaa43" Workload="10.67.124.136-k8s-csi--node--driver--ltzxd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031b3a0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.67.124.136", "pod":"csi-node-driver-ltzxd", "timestamp":"2025-05-15 10:45:17.589727726 +0000 UTC"}, Hostname:"10.67.124.136", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:45:17.625137 env[1248]: 2025-05-15 10:45:17.597 [INFO][2499] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:45:17.625137 env[1248]: 2025-05-15 10:45:17.597 [INFO][2499] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:45:17.625137 env[1248]: 2025-05-15 10:45:17.597 [INFO][2499] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.124.136' May 15 10:45:17.625137 env[1248]: 2025-05-15 10:45:17.597 [INFO][2499] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.8004900860a352ad72c22d25050c2dc84ca955a63f75bdfed33dd9b739cdaa43" host="10.67.124.136" May 15 10:45:17.625137 env[1248]: 2025-05-15 10:45:17.602 [INFO][2499] ipam/ipam.go 372: Looking up existing affinities for host host="10.67.124.136" May 15 10:45:17.625137 env[1248]: 2025-05-15 10:45:17.604 [INFO][2499] ipam/ipam.go 489: Trying affinity for 192.168.52.192/26 host="10.67.124.136" May 15 10:45:17.625137 env[1248]: 2025-05-15 10:45:17.605 [INFO][2499] ipam/ipam.go 155: Attempting to load block cidr=192.168.52.192/26 host="10.67.124.136" May 15 10:45:17.625137 env[1248]: 2025-05-15 10:45:17.606 [INFO][2499] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.52.192/26 host="10.67.124.136" May 15 10:45:17.625137 env[1248]: 2025-05-15 10:45:17.606 [INFO][2499] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.52.192/26 handle="k8s-pod-network.8004900860a352ad72c22d25050c2dc84ca955a63f75bdfed33dd9b739cdaa43" host="10.67.124.136" May 15 10:45:17.625137 env[1248]: 2025-05-15 10:45:17.607 [INFO][2499] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.8004900860a352ad72c22d25050c2dc84ca955a63f75bdfed33dd9b739cdaa43 May 15 10:45:17.625137 env[1248]: 2025-05-15 10:45:17.609 [INFO][2499] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.52.192/26 handle="k8s-pod-network.8004900860a352ad72c22d25050c2dc84ca955a63f75bdfed33dd9b739cdaa43" host="10.67.124.136" May 15 10:45:17.625137 env[1248]: 2025-05-15 10:45:17.612 [INFO][2499] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.52.193/26] block=192.168.52.192/26 handle="k8s-pod-network.8004900860a352ad72c22d25050c2dc84ca955a63f75bdfed33dd9b739cdaa43" host="10.67.124.136" May 15 10:45:17.625137 env[1248]: 2025-05-15 10:45:17.612 [INFO][2499] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.52.193/26] handle="k8s-pod-network.8004900860a352ad72c22d25050c2dc84ca955a63f75bdfed33dd9b739cdaa43" host="10.67.124.136" May 15 10:45:17.625137 env[1248]: 2025-05-15 10:45:17.612 [INFO][2499] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:45:17.625137 env[1248]: 2025-05-15 10:45:17.612 [INFO][2499] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.52.193/26] IPv6=[] ContainerID="8004900860a352ad72c22d25050c2dc84ca955a63f75bdfed33dd9b739cdaa43" HandleID="k8s-pod-network.8004900860a352ad72c22d25050c2dc84ca955a63f75bdfed33dd9b739cdaa43" Workload="10.67.124.136-k8s-csi--node--driver--ltzxd-eth0" May 15 10:45:17.625687 env[1248]: 2025-05-15 10:45:17.613 [INFO][2486] cni-plugin/k8s.go 386: Populated endpoint ContainerID="8004900860a352ad72c22d25050c2dc84ca955a63f75bdfed33dd9b739cdaa43" Namespace="calico-system" Pod="csi-node-driver-ltzxd" WorkloadEndpoint="10.67.124.136-k8s-csi--node--driver--ltzxd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.136-k8s-csi--node--driver--ltzxd-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"9e0bf444-ae9d-48a1-95c6-b12cd232dbd4", ResourceVersion:"1087", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 44, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.136", ContainerID:"", Pod:"csi-node-driver-ltzxd", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.52.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali5b0ed8e0c57", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:45:17.625687 env[1248]: 2025-05-15 10:45:17.613 [INFO][2486] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.52.193/32] ContainerID="8004900860a352ad72c22d25050c2dc84ca955a63f75bdfed33dd9b739cdaa43" Namespace="calico-system" Pod="csi-node-driver-ltzxd" WorkloadEndpoint="10.67.124.136-k8s-csi--node--driver--ltzxd-eth0" May 15 10:45:17.625687 env[1248]: 2025-05-15 10:45:17.613 [INFO][2486] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5b0ed8e0c57 ContainerID="8004900860a352ad72c22d25050c2dc84ca955a63f75bdfed33dd9b739cdaa43" Namespace="calico-system" Pod="csi-node-driver-ltzxd" WorkloadEndpoint="10.67.124.136-k8s-csi--node--driver--ltzxd-eth0" May 15 10:45:17.625687 env[1248]: 2025-05-15 10:45:17.618 [INFO][2486] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="8004900860a352ad72c22d25050c2dc84ca955a63f75bdfed33dd9b739cdaa43" Namespace="calico-system" Pod="csi-node-driver-ltzxd" WorkloadEndpoint="10.67.124.136-k8s-csi--node--driver--ltzxd-eth0" May 15 10:45:17.625687 env[1248]: 2025-05-15 10:45:17.618 [INFO][2486] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="8004900860a352ad72c22d25050c2dc84ca955a63f75bdfed33dd9b739cdaa43" Namespace="calico-system" Pod="csi-node-driver-ltzxd" WorkloadEndpoint="10.67.124.136-k8s-csi--node--driver--ltzxd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.136-k8s-csi--node--driver--ltzxd-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"9e0bf444-ae9d-48a1-95c6-b12cd232dbd4", ResourceVersion:"1087", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 44, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.136", ContainerID:"8004900860a352ad72c22d25050c2dc84ca955a63f75bdfed33dd9b739cdaa43", Pod:"csi-node-driver-ltzxd", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.52.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali5b0ed8e0c57", MAC:"8a:f1:54:6a:e1:a0", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:45:17.625687 env[1248]: 2025-05-15 10:45:17.623 [INFO][2486] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="8004900860a352ad72c22d25050c2dc84ca955a63f75bdfed33dd9b739cdaa43" Namespace="calico-system" Pod="csi-node-driver-ltzxd" WorkloadEndpoint="10.67.124.136-k8s-csi--node--driver--ltzxd-eth0" May 15 10:45:17.635000 audit[2533]: NETFILTER_CFG table=filter:69 family=2 entries=34 op=nft_register_chain pid=2533 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:45:17.635000 audit[2533]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffef727da50 a2=0 a3=7ffef727da3c items=0 ppid=2267 pid=2533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:17.635000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:45:17.637825 env[1248]: time="2025-05-15T10:45:17.633636153Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:45:17.637825 env[1248]: time="2025-05-15T10:45:17.633657920Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:45:17.637825 env[1248]: time="2025-05-15T10:45:17.633664977Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:45:17.637825 env[1248]: time="2025-05-15T10:45:17.633905003Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8004900860a352ad72c22d25050c2dc84ca955a63f75bdfed33dd9b739cdaa43 pid=2527 runtime=io.containerd.runc.v2 May 15 10:45:17.650789 systemd[1]: Started cri-containerd-8004900860a352ad72c22d25050c2dc84ca955a63f75bdfed33dd9b739cdaa43.scope. May 15 10:45:17.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:17.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:17.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:17.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:17.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:17.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:17.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:17.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:17.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:17.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:17.655000 audit: BPF prog-id=100 op=LOAD May 15 10:45:17.655000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:17.655000 audit[2536]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2527 pid=2536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:17.655000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830303439303038363061333532616437326332326432353035306332 May 15 10:45:17.655000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:17.655000 audit[2536]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2527 pid=2536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:17.655000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830303439303038363061333532616437326332326432353035306332 May 15 10:45:17.656000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:17.656000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:17.656000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:17.656000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:17.656000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:17.656000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:17.656000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:17.656000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:17.656000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:17.656000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:17.656000 audit: BPF prog-id=101 op=LOAD May 15 10:45:17.656000 audit[2536]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000285920 items=0 ppid=2527 pid=2536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:17.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830303439303038363061333532616437326332326432353035306332 May 15 10:45:17.656000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:17.656000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:17.656000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:17.656000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:17.656000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:17.656000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:17.656000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:17.656000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:17.656000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:17.656000 audit: BPF prog-id=102 op=LOAD May 15 10:45:17.656000 audit[2536]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000285968 items=0 ppid=2527 pid=2536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:17.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830303439303038363061333532616437326332326432353035306332 May 15 10:45:17.657000 audit: BPF prog-id=102 op=UNLOAD May 15 10:45:17.657000 audit: BPF prog-id=101 op=UNLOAD May 15 10:45:17.657000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:17.657000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:17.657000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:17.657000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:17.657000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:17.657000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:17.657000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:17.657000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:17.657000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:17.657000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:17.657000 audit: BPF prog-id=103 op=LOAD May 15 10:45:17.657000 audit[2536]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000285d78 items=0 ppid=2527 pid=2536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:17.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830303439303038363061333532616437326332326432353035306332 May 15 10:45:17.659238 systemd-resolved[1194]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:45:17.666114 env[1248]: time="2025-05-15T10:45:17.666089250Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ltzxd,Uid:9e0bf444-ae9d-48a1-95c6-b12cd232dbd4,Namespace:calico-system,Attempt:1,} returns sandbox id \"8004900860a352ad72c22d25050c2dc84ca955a63f75bdfed33dd9b739cdaa43\"" May 15 10:45:17.666923 env[1248]: time="2025-05-15T10:45:17.666910266Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 15 10:45:18.199607 kubelet[1593]: E0515 10:45:18.199575 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:18.533895 systemd[1]: run-containerd-runc-k8s.io-8004900860a352ad72c22d25050c2dc84ca955a63f75bdfed33dd9b739cdaa43-runc.6uMe8a.mount: Deactivated successfully. May 15 10:45:19.089358 systemd-networkd[1064]: cali5b0ed8e0c57: Gained IPv6LL May 15 10:45:19.200530 kubelet[1593]: E0515 10:45:19.200504 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:19.456104 env[1248]: time="2025-05-15T10:45:19.456035531Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:45:19.461536 env[1248]: time="2025-05-15T10:45:19.461517279Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:45:19.466399 env[1248]: time="2025-05-15T10:45:19.466377152Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:45:19.467257 env[1248]: time="2025-05-15T10:45:19.467240083Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:45:19.467734 env[1248]: time="2025-05-15T10:45:19.467715146Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505\"" May 15 10:45:19.469733 env[1248]: time="2025-05-15T10:45:19.469707205Z" level=info msg="CreateContainer within sandbox \"8004900860a352ad72c22d25050c2dc84ca955a63f75bdfed33dd9b739cdaa43\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 15 10:45:19.477898 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2323282565.mount: Deactivated successfully. May 15 10:45:19.479994 env[1248]: time="2025-05-15T10:45:19.479968263Z" level=info msg="CreateContainer within sandbox \"8004900860a352ad72c22d25050c2dc84ca955a63f75bdfed33dd9b739cdaa43\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"6bb87a01ad9e0c74a4ba470002a571007ac525562f54a6739182bcd39ed0a342\"" May 15 10:45:19.480476 env[1248]: time="2025-05-15T10:45:19.480459935Z" level=info msg="StartContainer for \"6bb87a01ad9e0c74a4ba470002a571007ac525562f54a6739182bcd39ed0a342\"" May 15 10:45:19.495762 systemd[1]: Started cri-containerd-6bb87a01ad9e0c74a4ba470002a571007ac525562f54a6739182bcd39ed0a342.scope. May 15 10:45:19.506000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:19.510436 kernel: kauditd_printk_skb: 608 callbacks suppressed May 15 10:45:19.510502 kernel: audit: type=1400 audit(1747305919.506:662): avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:19.510528 kernel: audit: type=1300 audit(1747305919.506:662): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fa24c171688 items=0 ppid=2527 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:19.506000 audit[2570]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fa24c171688 items=0 ppid=2527 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:19.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662623837613031616439653063373461346261343730303032613537 May 15 10:45:19.517566 kernel: audit: type=1327 audit(1747305919.506:662): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662623837613031616439653063373461346261343730303032613537 May 15 10:45:19.506000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:19.519952 kernel: audit: type=1400 audit(1747305919.506:663): avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:19.519989 kernel: audit: type=1400 audit(1747305919.506:663): avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:19.506000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:19.506000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:19.524714 kernel: audit: type=1400 audit(1747305919.506:663): avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:19.506000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:19.527366 kernel: audit: type=1400 audit(1747305919.506:663): avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:19.506000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:19.529967 kernel: audit: type=1400 audit(1747305919.506:663): avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:19.506000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:19.533625 kernel: audit: type=1400 audit(1747305919.506:663): avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:19.534354 systemd[1]: run-containerd-runc-k8s.io-6bb87a01ad9e0c74a4ba470002a571007ac525562f54a6739182bcd39ed0a342-runc.fqkKVk.mount: Deactivated successfully. May 15 10:45:19.506000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:19.506000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:19.537236 kernel: audit: type=1400 audit(1747305919.506:663): avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:19.506000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:19.506000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:19.506000 audit: BPF prog-id=104 op=LOAD May 15 10:45:19.506000 audit[2570]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0002123d8 items=0 ppid=2527 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:19.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662623837613031616439653063373461346261343730303032613537 May 15 10:45:19.509000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:19.509000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:19.509000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:19.509000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:19.509000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:19.509000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:19.509000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:19.509000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:19.509000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:19.509000 audit: BPF prog-id=105 op=LOAD May 15 10:45:19.509000 audit[2570]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000212428 items=0 ppid=2527 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:19.509000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662623837613031616439653063373461346261343730303032613537 May 15 10:45:19.513000 audit: BPF prog-id=105 op=UNLOAD May 15 10:45:19.513000 audit: BPF prog-id=104 op=UNLOAD May 15 10:45:19.513000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:19.513000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:19.513000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:19.513000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:19.513000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:19.513000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:19.513000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:19.513000 audit[2570]: AVC avc: denied { perfmon } for pid=2570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:19.513000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:19.513000 audit[2570]: AVC avc: denied { bpf } for pid=2570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:19.513000 audit: BPF prog-id=106 op=LOAD May 15 10:45:19.513000 audit[2570]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0002124b8 items=0 ppid=2527 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:19.513000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662623837613031616439653063373461346261343730303032613537 May 15 10:45:19.541316 env[1248]: time="2025-05-15T10:45:19.541294885Z" level=info msg="StartContainer for \"6bb87a01ad9e0c74a4ba470002a571007ac525562f54a6739182bcd39ed0a342\" returns successfully" May 15 10:45:19.542122 env[1248]: time="2025-05-15T10:45:19.542095180Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 15 10:45:20.201325 kubelet[1593]: E0515 10:45:20.201289 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:21.202074 kubelet[1593]: E0515 10:45:21.202044 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:21.544041 env[1248]: time="2025-05-15T10:45:21.543993044Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:45:21.544830 env[1248]: time="2025-05-15T10:45:21.544808417Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:45:21.545849 env[1248]: time="2025-05-15T10:45:21.545830883Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:45:21.546698 env[1248]: time="2025-05-15T10:45:21.546680197Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:45:21.547024 env[1248]: time="2025-05-15T10:45:21.547001709Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9\"" May 15 10:45:21.548596 env[1248]: time="2025-05-15T10:45:21.548576517Z" level=info msg="CreateContainer within sandbox \"8004900860a352ad72c22d25050c2dc84ca955a63f75bdfed33dd9b739cdaa43\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 15 10:45:21.555401 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2441521952.mount: Deactivated successfully. May 15 10:45:21.578828 env[1248]: time="2025-05-15T10:45:21.578792074Z" level=info msg="CreateContainer within sandbox \"8004900860a352ad72c22d25050c2dc84ca955a63f75bdfed33dd9b739cdaa43\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"3eaba69ab4817dc499310469d391a2fa4c8c206654910d94d8c9299ddd40b086\"" May 15 10:45:21.579219 env[1248]: time="2025-05-15T10:45:21.579186176Z" level=info msg="StartContainer for \"3eaba69ab4817dc499310469d391a2fa4c8c206654910d94d8c9299ddd40b086\"" May 15 10:45:21.591156 systemd[1]: Started cri-containerd-3eaba69ab4817dc499310469d391a2fa4c8c206654910d94d8c9299ddd40b086.scope. May 15 10:45:21.595742 systemd[1]: run-containerd-runc-k8s.io-3eaba69ab4817dc499310469d391a2fa4c8c206654910d94d8c9299ddd40b086-runc.ER1032.mount: Deactivated successfully. May 15 10:45:21.605000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:21.605000 audit[2612]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f0990512cc8 items=0 ppid=2527 pid=2612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:21.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365616261363961623438313764633439393331303436396433393161 May 15 10:45:21.605000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:21.605000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:21.605000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:21.605000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:21.605000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:21.605000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:21.605000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:21.605000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:21.605000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:21.605000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:21.605000 audit: BPF prog-id=107 op=LOAD May 15 10:45:21.605000 audit[2612]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000304808 items=0 ppid=2527 pid=2612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:21.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365616261363961623438313764633439393331303436396433393161 May 15 10:45:21.606000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:21.606000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:21.606000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:21.606000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:21.606000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:21.606000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:21.606000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:21.606000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:21.606000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:21.606000 audit: BPF prog-id=108 op=LOAD May 15 10:45:21.606000 audit[2612]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000304858 items=0 ppid=2527 pid=2612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:21.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365616261363961623438313764633439393331303436396433393161 May 15 10:45:21.606000 audit: BPF prog-id=108 op=UNLOAD May 15 10:45:21.606000 audit: BPF prog-id=107 op=UNLOAD May 15 10:45:21.606000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:21.606000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:21.606000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:21.606000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:21.606000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:21.606000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:21.606000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:21.606000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:21.606000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:21.606000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:21.606000 audit: BPF prog-id=109 op=LOAD May 15 10:45:21.606000 audit[2612]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003048e8 items=0 ppid=2527 pid=2612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:21.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365616261363961623438313764633439393331303436396433393161 May 15 10:45:21.622512 env[1248]: time="2025-05-15T10:45:21.622487998Z" level=info msg="StartContainer for \"3eaba69ab4817dc499310469d391a2fa4c8c206654910d94d8c9299ddd40b086\" returns successfully" May 15 10:45:22.202488 kubelet[1593]: E0515 10:45:22.202429 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:22.279469 kubelet[1593]: I0515 10:45:22.279445 1593 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 15 10:45:22.279469 kubelet[1593]: I0515 10:45:22.279465 1593 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 15 10:45:23.203115 kubelet[1593]: E0515 10:45:23.203081 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:24.203839 kubelet[1593]: E0515 10:45:24.203812 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:25.204952 kubelet[1593]: E0515 10:45:25.204927 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:25.308572 env[1248]: time="2025-05-15T10:45:25.308065901Z" level=info msg="StopPodSandbox for \"9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765\"" May 15 10:45:25.341241 kubelet[1593]: I0515 10:45:25.341180 1593 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-ltzxd" podStartSLOduration=28.460217791 podStartE2EDuration="32.341164512s" podCreationTimestamp="2025-05-15 10:44:53 +0000 UTC" firstStartedPulling="2025-05-15 10:45:17.666780079 +0000 UTC m=+24.927029880" lastFinishedPulling="2025-05-15 10:45:21.547726797 +0000 UTC m=+28.807976601" observedRunningTime="2025-05-15 10:45:22.361165201 +0000 UTC m=+29.621415013" watchObservedRunningTime="2025-05-15 10:45:25.341164512 +0000 UTC m=+32.601414326" May 15 10:45:25.366154 env[1248]: 2025-05-15 10:45:25.341 [INFO][2664] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765" May 15 10:45:25.366154 env[1248]: 2025-05-15 10:45:25.341 [INFO][2664] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765" iface="eth0" netns="/var/run/netns/cni-af99dd42-4fe5-bcab-2b53-6130942478a9" May 15 10:45:25.366154 env[1248]: 2025-05-15 10:45:25.341 [INFO][2664] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765" iface="eth0" netns="/var/run/netns/cni-af99dd42-4fe5-bcab-2b53-6130942478a9" May 15 10:45:25.366154 env[1248]: 2025-05-15 10:45:25.341 [INFO][2664] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765" iface="eth0" netns="/var/run/netns/cni-af99dd42-4fe5-bcab-2b53-6130942478a9" May 15 10:45:25.366154 env[1248]: 2025-05-15 10:45:25.341 [INFO][2664] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765" May 15 10:45:25.366154 env[1248]: 2025-05-15 10:45:25.341 [INFO][2664] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765" May 15 10:45:25.366154 env[1248]: 2025-05-15 10:45:25.354 [INFO][2672] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765" HandleID="k8s-pod-network.9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765" Workload="10.67.124.136-k8s-nginx--deployment--7fcdb87857--xl57b-eth0" May 15 10:45:25.366154 env[1248]: 2025-05-15 10:45:25.354 [INFO][2672] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:45:25.366154 env[1248]: 2025-05-15 10:45:25.354 [INFO][2672] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:45:25.366154 env[1248]: 2025-05-15 10:45:25.363 [WARNING][2672] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765" HandleID="k8s-pod-network.9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765" Workload="10.67.124.136-k8s-nginx--deployment--7fcdb87857--xl57b-eth0" May 15 10:45:25.366154 env[1248]: 2025-05-15 10:45:25.363 [INFO][2672] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765" HandleID="k8s-pod-network.9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765" Workload="10.67.124.136-k8s-nginx--deployment--7fcdb87857--xl57b-eth0" May 15 10:45:25.366154 env[1248]: 2025-05-15 10:45:25.364 [INFO][2672] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:45:25.366154 env[1248]: 2025-05-15 10:45:25.365 [INFO][2664] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765" May 15 10:45:25.368554 systemd[1]: run-netns-cni\x2daf99dd42\x2d4fe5\x2dbcab\x2d2b53\x2d6130942478a9.mount: Deactivated successfully. May 15 10:45:25.369516 env[1248]: time="2025-05-15T10:45:25.369490835Z" level=info msg="TearDown network for sandbox \"9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765\" successfully" May 15 10:45:25.369582 env[1248]: time="2025-05-15T10:45:25.369570840Z" level=info msg="StopPodSandbox for \"9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765\" returns successfully" May 15 10:45:25.370009 env[1248]: time="2025-05-15T10:45:25.369995722Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-xl57b,Uid:761f3c7f-9dda-42c0-a797-28c5ac5e3509,Namespace:default,Attempt:1,}" May 15 10:45:25.473752 systemd-networkd[1064]: cali5a60e4f3963: Link UP May 15 10:45:25.478940 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 10:45:25.479049 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5a60e4f3963: link becomes ready May 15 10:45:25.479148 systemd-networkd[1064]: cali5a60e4f3963: Gained carrier May 15 10:45:25.490286 env[1248]: 2025-05-15 10:45:25.407 [INFO][2678] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.124.136-k8s-nginx--deployment--7fcdb87857--xl57b-eth0 nginx-deployment-7fcdb87857- default 761f3c7f-9dda-42c0-a797-28c5ac5e3509 1119 0 2025-05-15 10:45:11 +0000 UTC map[app:nginx pod-template-hash:7fcdb87857 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.67.124.136 nginx-deployment-7fcdb87857-xl57b eth0 default [] [] [kns.default ksa.default.default] cali5a60e4f3963 [] []}} ContainerID="86cbcbc66c2ec3dfec29b04cc16828988268547976c9bda18e5af91550d08e96" Namespace="default" Pod="nginx-deployment-7fcdb87857-xl57b" WorkloadEndpoint="10.67.124.136-k8s-nginx--deployment--7fcdb87857--xl57b-" May 15 10:45:25.490286 env[1248]: 2025-05-15 10:45:25.407 [INFO][2678] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="86cbcbc66c2ec3dfec29b04cc16828988268547976c9bda18e5af91550d08e96" Namespace="default" Pod="nginx-deployment-7fcdb87857-xl57b" WorkloadEndpoint="10.67.124.136-k8s-nginx--deployment--7fcdb87857--xl57b-eth0" May 15 10:45:25.490286 env[1248]: 2025-05-15 10:45:25.425 [INFO][2692] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="86cbcbc66c2ec3dfec29b04cc16828988268547976c9bda18e5af91550d08e96" HandleID="k8s-pod-network.86cbcbc66c2ec3dfec29b04cc16828988268547976c9bda18e5af91550d08e96" Workload="10.67.124.136-k8s-nginx--deployment--7fcdb87857--xl57b-eth0" May 15 10:45:25.490286 env[1248]: 2025-05-15 10:45:25.433 [INFO][2692] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="86cbcbc66c2ec3dfec29b04cc16828988268547976c9bda18e5af91550d08e96" HandleID="k8s-pod-network.86cbcbc66c2ec3dfec29b04cc16828988268547976c9bda18e5af91550d08e96" Workload="10.67.124.136-k8s-nginx--deployment--7fcdb87857--xl57b-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000292b40), Attrs:map[string]string{"namespace":"default", "node":"10.67.124.136", "pod":"nginx-deployment-7fcdb87857-xl57b", "timestamp":"2025-05-15 10:45:25.425553567 +0000 UTC"}, Hostname:"10.67.124.136", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:45:25.490286 env[1248]: 2025-05-15 10:45:25.433 [INFO][2692] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:45:25.490286 env[1248]: 2025-05-15 10:45:25.433 [INFO][2692] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:45:25.490286 env[1248]: 2025-05-15 10:45:25.433 [INFO][2692] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.124.136' May 15 10:45:25.490286 env[1248]: 2025-05-15 10:45:25.434 [INFO][2692] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.86cbcbc66c2ec3dfec29b04cc16828988268547976c9bda18e5af91550d08e96" host="10.67.124.136" May 15 10:45:25.490286 env[1248]: 2025-05-15 10:45:25.443 [INFO][2692] ipam/ipam.go 372: Looking up existing affinities for host host="10.67.124.136" May 15 10:45:25.490286 env[1248]: 2025-05-15 10:45:25.446 [INFO][2692] ipam/ipam.go 489: Trying affinity for 192.168.52.192/26 host="10.67.124.136" May 15 10:45:25.490286 env[1248]: 2025-05-15 10:45:25.447 [INFO][2692] ipam/ipam.go 155: Attempting to load block cidr=192.168.52.192/26 host="10.67.124.136" May 15 10:45:25.490286 env[1248]: 2025-05-15 10:45:25.448 [INFO][2692] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.52.192/26 host="10.67.124.136" May 15 10:45:25.490286 env[1248]: 2025-05-15 10:45:25.448 [INFO][2692] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.52.192/26 handle="k8s-pod-network.86cbcbc66c2ec3dfec29b04cc16828988268547976c9bda18e5af91550d08e96" host="10.67.124.136" May 15 10:45:25.490286 env[1248]: 2025-05-15 10:45:25.449 [INFO][2692] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.86cbcbc66c2ec3dfec29b04cc16828988268547976c9bda18e5af91550d08e96 May 15 10:45:25.490286 env[1248]: 2025-05-15 10:45:25.453 [INFO][2692] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.52.192/26 handle="k8s-pod-network.86cbcbc66c2ec3dfec29b04cc16828988268547976c9bda18e5af91550d08e96" host="10.67.124.136" May 15 10:45:25.490286 env[1248]: 2025-05-15 10:45:25.469 [INFO][2692] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.52.194/26] block=192.168.52.192/26 handle="k8s-pod-network.86cbcbc66c2ec3dfec29b04cc16828988268547976c9bda18e5af91550d08e96" host="10.67.124.136" May 15 10:45:25.490286 env[1248]: 2025-05-15 10:45:25.469 [INFO][2692] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.52.194/26] handle="k8s-pod-network.86cbcbc66c2ec3dfec29b04cc16828988268547976c9bda18e5af91550d08e96" host="10.67.124.136" May 15 10:45:25.490286 env[1248]: 2025-05-15 10:45:25.469 [INFO][2692] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:45:25.490286 env[1248]: 2025-05-15 10:45:25.469 [INFO][2692] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.52.194/26] IPv6=[] ContainerID="86cbcbc66c2ec3dfec29b04cc16828988268547976c9bda18e5af91550d08e96" HandleID="k8s-pod-network.86cbcbc66c2ec3dfec29b04cc16828988268547976c9bda18e5af91550d08e96" Workload="10.67.124.136-k8s-nginx--deployment--7fcdb87857--xl57b-eth0" May 15 10:45:25.493458 env[1248]: 2025-05-15 10:45:25.470 [INFO][2678] cni-plugin/k8s.go 386: Populated endpoint ContainerID="86cbcbc66c2ec3dfec29b04cc16828988268547976c9bda18e5af91550d08e96" Namespace="default" Pod="nginx-deployment-7fcdb87857-xl57b" WorkloadEndpoint="10.67.124.136-k8s-nginx--deployment--7fcdb87857--xl57b-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.136-k8s-nginx--deployment--7fcdb87857--xl57b-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"761f3c7f-9dda-42c0-a797-28c5ac5e3509", ResourceVersion:"1119", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 45, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.136", ContainerID:"", Pod:"nginx-deployment-7fcdb87857-xl57b", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.52.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5a60e4f3963", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:45:25.493458 env[1248]: 2025-05-15 10:45:25.470 [INFO][2678] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.52.194/32] ContainerID="86cbcbc66c2ec3dfec29b04cc16828988268547976c9bda18e5af91550d08e96" Namespace="default" Pod="nginx-deployment-7fcdb87857-xl57b" WorkloadEndpoint="10.67.124.136-k8s-nginx--deployment--7fcdb87857--xl57b-eth0" May 15 10:45:25.493458 env[1248]: 2025-05-15 10:45:25.471 [INFO][2678] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5a60e4f3963 ContainerID="86cbcbc66c2ec3dfec29b04cc16828988268547976c9bda18e5af91550d08e96" Namespace="default" Pod="nginx-deployment-7fcdb87857-xl57b" WorkloadEndpoint="10.67.124.136-k8s-nginx--deployment--7fcdb87857--xl57b-eth0" May 15 10:45:25.493458 env[1248]: 2025-05-15 10:45:25.480 [INFO][2678] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="86cbcbc66c2ec3dfec29b04cc16828988268547976c9bda18e5af91550d08e96" Namespace="default" Pod="nginx-deployment-7fcdb87857-xl57b" WorkloadEndpoint="10.67.124.136-k8s-nginx--deployment--7fcdb87857--xl57b-eth0" May 15 10:45:25.493458 env[1248]: 2025-05-15 10:45:25.480 [INFO][2678] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="86cbcbc66c2ec3dfec29b04cc16828988268547976c9bda18e5af91550d08e96" Namespace="default" Pod="nginx-deployment-7fcdb87857-xl57b" WorkloadEndpoint="10.67.124.136-k8s-nginx--deployment--7fcdb87857--xl57b-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.136-k8s-nginx--deployment--7fcdb87857--xl57b-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"761f3c7f-9dda-42c0-a797-28c5ac5e3509", ResourceVersion:"1119", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 45, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.136", ContainerID:"86cbcbc66c2ec3dfec29b04cc16828988268547976c9bda18e5af91550d08e96", Pod:"nginx-deployment-7fcdb87857-xl57b", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.52.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5a60e4f3963", MAC:"72:da:b5:52:26:07", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:45:25.493458 env[1248]: 2025-05-15 10:45:25.488 [INFO][2678] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="86cbcbc66c2ec3dfec29b04cc16828988268547976c9bda18e5af91550d08e96" Namespace="default" Pod="nginx-deployment-7fcdb87857-xl57b" WorkloadEndpoint="10.67.124.136-k8s-nginx--deployment--7fcdb87857--xl57b-eth0" May 15 10:45:25.496000 audit[2712]: NETFILTER_CFG table=filter:70 family=2 entries=38 op=nft_register_chain pid=2712 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:45:25.498874 kernel: kauditd_printk_skb: 76 callbacks suppressed May 15 10:45:25.498906 kernel: audit: type=1325 audit(1747305925.496:674): table=filter:70 family=2 entries=38 op=nft_register_chain pid=2712 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:45:25.496000 audit[2712]: SYSCALL arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7fff38e2fff0 a2=0 a3=7fff38e2ffdc items=0 ppid=2267 pid=2712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:25.504715 kernel: audit: type=1300 audit(1747305925.496:674): arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7fff38e2fff0 a2=0 a3=7fff38e2ffdc items=0 ppid=2267 pid=2712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:25.496000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:45:25.508465 env[1248]: time="2025-05-15T10:45:25.508140435Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:45:25.508465 env[1248]: time="2025-05-15T10:45:25.508170818Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:45:25.508465 env[1248]: time="2025-05-15T10:45:25.508178058Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:45:25.508465 env[1248]: time="2025-05-15T10:45:25.508256929Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/86cbcbc66c2ec3dfec29b04cc16828988268547976c9bda18e5af91550d08e96 pid=2720 runtime=io.containerd.runc.v2 May 15 10:45:25.509437 kernel: audit: type=1327 audit(1747305925.496:674): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:45:25.520736 systemd[1]: Started cri-containerd-86cbcbc66c2ec3dfec29b04cc16828988268547976c9bda18e5af91550d08e96.scope. May 15 10:45:25.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:25.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:25.534926 kernel: audit: type=1400 audit(1747305925.528:675): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:25.534957 kernel: audit: type=1400 audit(1747305925.528:676): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:25.534973 kernel: audit: type=1400 audit(1747305925.528:677): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:25.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:25.537934 systemd-resolved[1194]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:45:25.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:25.540457 kernel: audit: type=1400 audit(1747305925.528:678): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:25.540490 kernel: audit: type=1400 audit(1747305925.528:679): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:25.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:25.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:25.550330 kernel: audit: type=1400 audit(1747305925.528:680): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:25.550376 kernel: audit: type=1400 audit(1747305925.528:681): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:25.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:25.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:25.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:25.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:25.528000 audit: BPF prog-id=110 op=LOAD May 15 10:45:25.536000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:25.536000 audit[2730]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2720 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:25.536000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836636263626336366332656333646665633239623034636331363832 May 15 10:45:25.536000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:25.536000 audit[2730]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2720 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:25.536000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836636263626336366332656333646665633239623034636331363832 May 15 10:45:25.536000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:25.536000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:25.536000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:25.536000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:25.536000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:25.536000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:25.536000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:25.536000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:25.536000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:25.536000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:25.536000 audit: BPF prog-id=111 op=LOAD May 15 10:45:25.536000 audit[2730]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002a3bf0 items=0 ppid=2720 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:25.536000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836636263626336366332656333646665633239623034636331363832 May 15 10:45:25.536000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:25.536000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:25.536000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:25.536000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:25.536000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:25.536000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:25.536000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:25.536000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:25.536000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:25.536000 audit: BPF prog-id=112 op=LOAD May 15 10:45:25.536000 audit[2730]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002a3c38 items=0 ppid=2720 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:25.536000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836636263626336366332656333646665633239623034636331363832 May 15 10:45:25.536000 audit: BPF prog-id=112 op=UNLOAD May 15 10:45:25.536000 audit: BPF prog-id=111 op=UNLOAD May 15 10:45:25.536000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:25.536000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:25.536000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:25.536000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:25.536000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:25.536000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:25.536000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:25.536000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:25.536000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:25.536000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:25.536000 audit: BPF prog-id=113 op=LOAD May 15 10:45:25.536000 audit[2730]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000388048 items=0 ppid=2720 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:25.536000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836636263626336366332656333646665633239623034636331363832 May 15 10:45:25.561964 env[1248]: time="2025-05-15T10:45:25.561932147Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-xl57b,Uid:761f3c7f-9dda-42c0-a797-28c5ac5e3509,Namespace:default,Attempt:1,} returns sandbox id \"86cbcbc66c2ec3dfec29b04cc16828988268547976c9bda18e5af91550d08e96\"" May 15 10:45:25.563001 env[1248]: time="2025-05-15T10:45:25.562988566Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 15 10:45:26.206294 kubelet[1593]: E0515 10:45:26.206257 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:26.961365 systemd-networkd[1064]: cali5a60e4f3963: Gained IPv6LL May 15 10:45:27.207347 kubelet[1593]: E0515 10:45:27.207325 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:28.208341 kubelet[1593]: E0515 10:45:28.208305 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:28.639331 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4107640985.mount: Deactivated successfully. May 15 10:45:29.208992 kubelet[1593]: E0515 10:45:29.208946 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:30.210067 kubelet[1593]: E0515 10:45:30.210035 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:30.451712 env[1248]: time="2025-05-15T10:45:30.451668296Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:45:30.479447 env[1248]: time="2025-05-15T10:45:30.479427816Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:45:30.492995 env[1248]: time="2025-05-15T10:45:30.492971447Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:45:30.520680 env[1248]: time="2025-05-15T10:45:30.520661944Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:45:30.521131 env[1248]: time="2025-05-15T10:45:30.521115927Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa\"" May 15 10:45:30.522793 env[1248]: time="2025-05-15T10:45:30.522774262Z" level=info msg="CreateContainer within sandbox \"86cbcbc66c2ec3dfec29b04cc16828988268547976c9bda18e5af91550d08e96\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" May 15 10:45:30.593713 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1619759663.mount: Deactivated successfully. May 15 10:45:30.597896 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1272995818.mount: Deactivated successfully. May 15 10:45:30.637080 env[1248]: time="2025-05-15T10:45:30.637050577Z" level=info msg="CreateContainer within sandbox \"86cbcbc66c2ec3dfec29b04cc16828988268547976c9bda18e5af91550d08e96\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"bd3a91ec06e6c4a80abea95a065343ddeb616f9e05c41bb78b82a6b066d70b71\"" May 15 10:45:30.637689 env[1248]: time="2025-05-15T10:45:30.637669399Z" level=info msg="StartContainer for \"bd3a91ec06e6c4a80abea95a065343ddeb616f9e05c41bb78b82a6b066d70b71\"" May 15 10:45:30.652645 systemd[1]: Started cri-containerd-bd3a91ec06e6c4a80abea95a065343ddeb616f9e05c41bb78b82a6b066d70b71.scope. May 15 10:45:30.667449 kernel: kauditd_printk_skb: 50 callbacks suppressed May 15 10:45:30.667515 kernel: audit: type=1400 audit(1747305930.662:693): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:30.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:30.670450 kernel: audit: type=1400 audit(1747305930.662:694): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:30.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:30.672930 kernel: audit: type=1400 audit(1747305930.662:695): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:30.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:30.675503 kernel: audit: type=1400 audit(1747305930.662:696): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:30.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:30.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:30.678163 kernel: audit: type=1400 audit(1747305930.662:697): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:30.678219 kernel: audit: type=1400 audit(1747305930.662:698): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:30.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:30.680510 kernel: audit: type=1400 audit(1747305930.662:699): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:30.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:30.683076 kernel: audit: type=1400 audit(1747305930.662:700): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:30.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:30.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:30.688009 kernel: audit: type=1400 audit(1747305930.662:701): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:30.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:30.690547 kernel: audit: type=1400 audit(1747305930.662:702): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:30.662000 audit: BPF prog-id=114 op=LOAD May 15 10:45:30.666000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:30.666000 audit[2764]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2720 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:30.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264336139316563303665366334613830616265613935613036353334 May 15 10:45:30.666000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:30.666000 audit[2764]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2720 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:30.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264336139316563303665366334613830616265613935613036353334 May 15 10:45:30.666000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:30.666000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:30.666000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:30.666000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:30.666000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:30.666000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:30.666000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:30.666000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:30.666000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:30.666000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:30.666000 audit: BPF prog-id=115 op=LOAD May 15 10:45:30.666000 audit[2764]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00018f230 items=0 ppid=2720 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:30.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264336139316563303665366334613830616265613935613036353334 May 15 10:45:30.666000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:30.666000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:30.666000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:30.666000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:30.666000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:30.666000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:30.666000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:30.666000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:30.666000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:30.666000 audit: BPF prog-id=116 op=LOAD May 15 10:45:30.666000 audit[2764]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00018f278 items=0 ppid=2720 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:30.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264336139316563303665366334613830616265613935613036353334 May 15 10:45:30.666000 audit: BPF prog-id=116 op=UNLOAD May 15 10:45:30.666000 audit: BPF prog-id=115 op=UNLOAD May 15 10:45:30.666000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:30.666000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:30.666000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:30.666000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:30.666000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:30.666000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:30.666000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:30.666000 audit[2764]: AVC avc: denied { perfmon } for pid=2764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:30.666000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:30.666000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:30.666000 audit: BPF prog-id=117 op=LOAD May 15 10:45:30.666000 audit[2764]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00018f688 items=0 ppid=2720 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:30.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264336139316563303665366334613830616265613935613036353334 May 15 10:45:30.709874 env[1248]: time="2025-05-15T10:45:30.709845628Z" level=info msg="StartContainer for \"bd3a91ec06e6c4a80abea95a065343ddeb616f9e05c41bb78b82a6b066d70b71\" returns successfully" May 15 10:45:31.211126 kubelet[1593]: E0515 10:45:31.211058 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:32.211959 kubelet[1593]: E0515 10:45:32.211927 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:33.180644 kubelet[1593]: E0515 10:45:33.180613 1593 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:33.212309 kubelet[1593]: E0515 10:45:33.212270 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:34.212607 kubelet[1593]: E0515 10:45:34.212578 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:34.492000 audit[2811]: NETFILTER_CFG table=filter:71 family=2 entries=20 op=nft_register_rule pid=2811 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:45:34.492000 audit[2811]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7fff94e8dab0 a2=0 a3=7fff94e8da9c items=0 ppid=1809 pid=2811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:34.492000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:45:34.496000 audit[2811]: NETFILTER_CFG table=nat:72 family=2 entries=22 op=nft_register_rule pid=2811 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:45:34.496000 audit[2811]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff94e8dab0 a2=0 a3=0 items=0 ppid=1809 pid=2811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:34.496000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:45:34.504000 audit[2815]: NETFILTER_CFG table=filter:73 family=2 entries=32 op=nft_register_rule pid=2815 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:45:34.504000 audit[2815]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffe2294f430 a2=0 a3=7ffe2294f41c items=0 ppid=1809 pid=2815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:34.504000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:45:34.507000 audit[2815]: NETFILTER_CFG table=nat:74 family=2 entries=22 op=nft_register_rule pid=2815 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:45:34.507000 audit[2815]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe2294f430 a2=0 a3=0 items=0 ppid=1809 pid=2815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:34.507000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:45:34.628400 kubelet[1593]: I0515 10:45:34.628364 1593 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-7fcdb87857-xl57b" podStartSLOduration=18.668905296 podStartE2EDuration="23.628349541s" podCreationTimestamp="2025-05-15 10:45:11 +0000 UTC" firstStartedPulling="2025-05-15 10:45:25.562518003 +0000 UTC m=+32.822767803" lastFinishedPulling="2025-05-15 10:45:30.521962247 +0000 UTC m=+37.782212048" observedRunningTime="2025-05-15 10:45:31.37983491 +0000 UTC m=+38.640084723" watchObservedRunningTime="2025-05-15 10:45:34.628349541 +0000 UTC m=+41.888599346" May 15 10:45:34.631828 systemd[1]: Created slice kubepods-besteffort-podc8f04f91_0402_4321_9ecd_f2b389041d81.slice. May 15 10:45:34.733391 kubelet[1593]: I0515 10:45:34.733359 1593 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kqzkw\" (UniqueName: \"kubernetes.io/projected/c8f04f91-0402-4321-9ecd-f2b389041d81-kube-api-access-kqzkw\") pod \"nfs-server-provisioner-0\" (UID: \"c8f04f91-0402-4321-9ecd-f2b389041d81\") " pod="default/nfs-server-provisioner-0" May 15 10:45:34.733537 kubelet[1593]: I0515 10:45:34.733525 1593 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/c8f04f91-0402-4321-9ecd-f2b389041d81-data\") pod \"nfs-server-provisioner-0\" (UID: \"c8f04f91-0402-4321-9ecd-f2b389041d81\") " pod="default/nfs-server-provisioner-0" May 15 10:45:34.934353 env[1248]: time="2025-05-15T10:45:34.934292352Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:c8f04f91-0402-4321-9ecd-f2b389041d81,Namespace:default,Attempt:0,}" May 15 10:45:35.060787 systemd-networkd[1064]: cali60e51b789ff: Link UP May 15 10:45:35.062883 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 10:45:35.062963 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready May 15 10:45:35.063133 systemd-networkd[1064]: cali60e51b789ff: Gained carrier May 15 10:45:35.075473 env[1248]: 2025-05-15 10:45:34.996 [INFO][2820] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.124.136-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default c8f04f91-0402-4321-9ecd-f2b389041d81 1166 0 2025-05-15 10:45:34 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.67.124.136 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="1e7f89cb7d3492ba3ce993768b61bd2e6f63526cc1f6aa0dee33d9e86078328c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.136-k8s-nfs--server--provisioner--0-" May 15 10:45:35.075473 env[1248]: 2025-05-15 10:45:34.996 [INFO][2820] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="1e7f89cb7d3492ba3ce993768b61bd2e6f63526cc1f6aa0dee33d9e86078328c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.136-k8s-nfs--server--provisioner--0-eth0" May 15 10:45:35.075473 env[1248]: 2025-05-15 10:45:35.028 [INFO][2835] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1e7f89cb7d3492ba3ce993768b61bd2e6f63526cc1f6aa0dee33d9e86078328c" HandleID="k8s-pod-network.1e7f89cb7d3492ba3ce993768b61bd2e6f63526cc1f6aa0dee33d9e86078328c" Workload="10.67.124.136-k8s-nfs--server--provisioner--0-eth0" May 15 10:45:35.075473 env[1248]: 2025-05-15 10:45:35.034 [INFO][2835] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="1e7f89cb7d3492ba3ce993768b61bd2e6f63526cc1f6aa0dee33d9e86078328c" HandleID="k8s-pod-network.1e7f89cb7d3492ba3ce993768b61bd2e6f63526cc1f6aa0dee33d9e86078328c" Workload="10.67.124.136-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031b3c0), Attrs:map[string]string{"namespace":"default", "node":"10.67.124.136", "pod":"nfs-server-provisioner-0", "timestamp":"2025-05-15 10:45:35.027998863 +0000 UTC"}, Hostname:"10.67.124.136", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:45:35.075473 env[1248]: 2025-05-15 10:45:35.034 [INFO][2835] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:45:35.075473 env[1248]: 2025-05-15 10:45:35.034 [INFO][2835] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:45:35.075473 env[1248]: 2025-05-15 10:45:35.034 [INFO][2835] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.124.136' May 15 10:45:35.075473 env[1248]: 2025-05-15 10:45:35.035 [INFO][2835] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.1e7f89cb7d3492ba3ce993768b61bd2e6f63526cc1f6aa0dee33d9e86078328c" host="10.67.124.136" May 15 10:45:35.075473 env[1248]: 2025-05-15 10:45:35.036 [INFO][2835] ipam/ipam.go 372: Looking up existing affinities for host host="10.67.124.136" May 15 10:45:35.075473 env[1248]: 2025-05-15 10:45:35.044 [INFO][2835] ipam/ipam.go 489: Trying affinity for 192.168.52.192/26 host="10.67.124.136" May 15 10:45:35.075473 env[1248]: 2025-05-15 10:45:35.045 [INFO][2835] ipam/ipam.go 155: Attempting to load block cidr=192.168.52.192/26 host="10.67.124.136" May 15 10:45:35.075473 env[1248]: 2025-05-15 10:45:35.046 [INFO][2835] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.52.192/26 host="10.67.124.136" May 15 10:45:35.075473 env[1248]: 2025-05-15 10:45:35.046 [INFO][2835] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.52.192/26 handle="k8s-pod-network.1e7f89cb7d3492ba3ce993768b61bd2e6f63526cc1f6aa0dee33d9e86078328c" host="10.67.124.136" May 15 10:45:35.075473 env[1248]: 2025-05-15 10:45:35.047 [INFO][2835] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.1e7f89cb7d3492ba3ce993768b61bd2e6f63526cc1f6aa0dee33d9e86078328c May 15 10:45:35.075473 env[1248]: 2025-05-15 10:45:35.049 [INFO][2835] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.52.192/26 handle="k8s-pod-network.1e7f89cb7d3492ba3ce993768b61bd2e6f63526cc1f6aa0dee33d9e86078328c" host="10.67.124.136" May 15 10:45:35.075473 env[1248]: 2025-05-15 10:45:35.056 [INFO][2835] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.52.195/26] block=192.168.52.192/26 handle="k8s-pod-network.1e7f89cb7d3492ba3ce993768b61bd2e6f63526cc1f6aa0dee33d9e86078328c" host="10.67.124.136" May 15 10:45:35.075473 env[1248]: 2025-05-15 10:45:35.056 [INFO][2835] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.52.195/26] handle="k8s-pod-network.1e7f89cb7d3492ba3ce993768b61bd2e6f63526cc1f6aa0dee33d9e86078328c" host="10.67.124.136" May 15 10:45:35.075473 env[1248]: 2025-05-15 10:45:35.057 [INFO][2835] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:45:35.075473 env[1248]: 2025-05-15 10:45:35.057 [INFO][2835] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.52.195/26] IPv6=[] ContainerID="1e7f89cb7d3492ba3ce993768b61bd2e6f63526cc1f6aa0dee33d9e86078328c" HandleID="k8s-pod-network.1e7f89cb7d3492ba3ce993768b61bd2e6f63526cc1f6aa0dee33d9e86078328c" Workload="10.67.124.136-k8s-nfs--server--provisioner--0-eth0" May 15 10:45:35.076911 env[1248]: 2025-05-15 10:45:35.058 [INFO][2820] cni-plugin/k8s.go 386: Populated endpoint ContainerID="1e7f89cb7d3492ba3ce993768b61bd2e6f63526cc1f6aa0dee33d9e86078328c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.136-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.136-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"c8f04f91-0402-4321-9ecd-f2b389041d81", ResourceVersion:"1166", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 45, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.136", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.52.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:45:35.076911 env[1248]: 2025-05-15 10:45:35.058 [INFO][2820] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.52.195/32] ContainerID="1e7f89cb7d3492ba3ce993768b61bd2e6f63526cc1f6aa0dee33d9e86078328c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.136-k8s-nfs--server--provisioner--0-eth0" May 15 10:45:35.076911 env[1248]: 2025-05-15 10:45:35.058 [INFO][2820] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="1e7f89cb7d3492ba3ce993768b61bd2e6f63526cc1f6aa0dee33d9e86078328c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.136-k8s-nfs--server--provisioner--0-eth0" May 15 10:45:35.076911 env[1248]: 2025-05-15 10:45:35.063 [INFO][2820] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="1e7f89cb7d3492ba3ce993768b61bd2e6f63526cc1f6aa0dee33d9e86078328c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.136-k8s-nfs--server--provisioner--0-eth0" May 15 10:45:35.077044 env[1248]: 2025-05-15 10:45:35.067 [INFO][2820] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="1e7f89cb7d3492ba3ce993768b61bd2e6f63526cc1f6aa0dee33d9e86078328c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.136-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.136-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"c8f04f91-0402-4321-9ecd-f2b389041d81", ResourceVersion:"1166", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 45, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.136", ContainerID:"1e7f89cb7d3492ba3ce993768b61bd2e6f63526cc1f6aa0dee33d9e86078328c", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.52.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"ba:01:38:42:f6:ea", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:45:35.077044 env[1248]: 2025-05-15 10:45:35.074 [INFO][2820] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="1e7f89cb7d3492ba3ce993768b61bd2e6f63526cc1f6aa0dee33d9e86078328c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.124.136-k8s-nfs--server--provisioner--0-eth0" May 15 10:45:35.085098 env[1248]: time="2025-05-15T10:45:35.085042631Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:45:35.085098 env[1248]: time="2025-05-15T10:45:35.085094487Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:45:35.085248 env[1248]: time="2025-05-15T10:45:35.085116068Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:45:35.085248 env[1248]: time="2025-05-15T10:45:35.085213520Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1e7f89cb7d3492ba3ce993768b61bd2e6f63526cc1f6aa0dee33d9e86078328c pid=2863 runtime=io.containerd.runc.v2 May 15 10:45:35.095407 systemd[1]: Started cri-containerd-1e7f89cb7d3492ba3ce993768b61bd2e6f63526cc1f6aa0dee33d9e86078328c.scope. May 15 10:45:35.098000 audit[2886]: NETFILTER_CFG table=filter:75 family=2 entries=44 op=nft_register_chain pid=2886 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:45:35.098000 audit[2886]: SYSCALL arch=c000003e syscall=46 success=yes exit=22672 a0=3 a1=7ffd76625260 a2=0 a3=7ffd7662524c items=0 ppid=2267 pid=2886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:35.098000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:45:35.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:35.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:35.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:35.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:35.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:35.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:35.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:35.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:35.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:35.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:35.107000 audit: BPF prog-id=118 op=LOAD May 15 10:45:35.107000 audit[2875]: AVC avc: denied { bpf } for pid=2875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:35.107000 audit[2875]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2863 pid=2875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:35.107000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165376638396362376433343932626133636539393337363862363162 May 15 10:45:35.107000 audit[2875]: AVC avc: denied { perfmon } for pid=2875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:35.107000 audit[2875]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2863 pid=2875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:35.107000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165376638396362376433343932626133636539393337363862363162 May 15 10:45:35.107000 audit[2875]: AVC avc: denied { bpf } for pid=2875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:35.107000 audit[2875]: AVC avc: denied { bpf } for pid=2875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:35.107000 audit[2875]: AVC avc: denied { bpf } for pid=2875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:35.107000 audit[2875]: AVC avc: denied { perfmon } for pid=2875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:35.107000 audit[2875]: AVC avc: denied { perfmon } for pid=2875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:35.107000 audit[2875]: AVC avc: denied { perfmon } for pid=2875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:35.107000 audit[2875]: AVC avc: denied { perfmon } for pid=2875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:35.107000 audit[2875]: AVC avc: denied { perfmon } for pid=2875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:35.107000 audit[2875]: AVC avc: denied { bpf } for pid=2875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:35.107000 audit[2875]: AVC avc: denied { bpf } for pid=2875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:35.107000 audit: BPF prog-id=119 op=LOAD May 15 10:45:35.107000 audit[2875]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c00021b870 items=0 ppid=2863 pid=2875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:35.107000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165376638396362376433343932626133636539393337363862363162 May 15 10:45:35.107000 audit[2875]: AVC avc: denied { bpf } for pid=2875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:35.107000 audit[2875]: AVC avc: denied { bpf } for pid=2875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:35.107000 audit[2875]: AVC avc: denied { perfmon } for pid=2875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:35.107000 audit[2875]: AVC avc: denied { perfmon } for pid=2875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:35.107000 audit[2875]: AVC avc: denied { perfmon } for pid=2875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:35.107000 audit[2875]: AVC avc: denied { perfmon } for pid=2875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:35.107000 audit[2875]: AVC avc: denied { perfmon } for pid=2875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:35.107000 audit[2875]: AVC avc: denied { bpf } for pid=2875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:35.107000 audit[2875]: AVC avc: denied { bpf } for pid=2875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:35.107000 audit: BPF prog-id=120 op=LOAD May 15 10:45:35.107000 audit[2875]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c00021b8b8 items=0 ppid=2863 pid=2875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:35.107000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165376638396362376433343932626133636539393337363862363162 May 15 10:45:35.107000 audit: BPF prog-id=120 op=UNLOAD May 15 10:45:35.107000 audit: BPF prog-id=119 op=UNLOAD May 15 10:45:35.107000 audit[2875]: AVC avc: denied { bpf } for pid=2875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:35.107000 audit[2875]: AVC avc: denied { bpf } for pid=2875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:35.107000 audit[2875]: AVC avc: denied { bpf } for pid=2875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:35.107000 audit[2875]: AVC avc: denied { perfmon } for pid=2875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:35.107000 audit[2875]: AVC avc: denied { perfmon } for pid=2875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:35.107000 audit[2875]: AVC avc: denied { perfmon } for pid=2875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:35.107000 audit[2875]: AVC avc: denied { perfmon } for pid=2875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:35.107000 audit[2875]: AVC avc: denied { perfmon } for pid=2875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:35.107000 audit[2875]: AVC avc: denied { bpf } for pid=2875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:35.107000 audit[2875]: AVC avc: denied { bpf } for pid=2875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:35.107000 audit: BPF prog-id=121 op=LOAD May 15 10:45:35.107000 audit[2875]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c00021bcc8 items=0 ppid=2863 pid=2875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:35.107000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165376638396362376433343932626133636539393337363862363162 May 15 10:45:35.109441 systemd-resolved[1194]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:45:35.128289 env[1248]: time="2025-05-15T10:45:35.128262144Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:c8f04f91-0402-4321-9ecd-f2b389041d81,Namespace:default,Attempt:0,} returns sandbox id \"1e7f89cb7d3492ba3ce993768b61bd2e6f63526cc1f6aa0dee33d9e86078328c\"" May 15 10:45:35.129143 env[1248]: time="2025-05-15T10:45:35.129127505Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" May 15 10:45:35.214224 kubelet[1593]: E0515 10:45:35.213160 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:36.213292 kubelet[1593]: E0515 10:45:36.213250 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:36.689580 systemd-networkd[1064]: cali60e51b789ff: Gained IPv6LL May 15 10:45:37.213477 kubelet[1593]: E0515 10:45:37.213450 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:37.308027 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount757570805.mount: Deactivated successfully. May 15 10:45:38.214507 kubelet[1593]: E0515 10:45:38.214460 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:38.980892 env[1248]: time="2025-05-15T10:45:38.980855724Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:45:38.982779 env[1248]: time="2025-05-15T10:45:38.982765122Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:45:38.984534 env[1248]: time="2025-05-15T10:45:38.984519369Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:45:38.985946 env[1248]: time="2025-05-15T10:45:38.985931688Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:45:38.986501 env[1248]: time="2025-05-15T10:45:38.986485390Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" May 15 10:45:38.989691 env[1248]: time="2025-05-15T10:45:38.989664089Z" level=info msg="CreateContainer within sandbox \"1e7f89cb7d3492ba3ce993768b61bd2e6f63526cc1f6aa0dee33d9e86078328c\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" May 15 10:45:38.995925 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2779531097.mount: Deactivated successfully. May 15 10:45:38.999853 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount302663960.mount: Deactivated successfully. May 15 10:45:39.002247 env[1248]: time="2025-05-15T10:45:39.002225477Z" level=info msg="CreateContainer within sandbox \"1e7f89cb7d3492ba3ce993768b61bd2e6f63526cc1f6aa0dee33d9e86078328c\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"1f08f56f9e1165137853ebb2813229634e986c049e5a3286da67688c1936794c\"" May 15 10:45:39.002868 env[1248]: time="2025-05-15T10:45:39.002847164Z" level=info msg="StartContainer for \"1f08f56f9e1165137853ebb2813229634e986c049e5a3286da67688c1936794c\"" May 15 10:45:39.022803 systemd[1]: Started cri-containerd-1f08f56f9e1165137853ebb2813229634e986c049e5a3286da67688c1936794c.scope. May 15 10:45:39.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:39.033322 kernel: kauditd_printk_skb: 119 callbacks suppressed May 15 10:45:39.033372 kernel: audit: type=1400 audit(1747305939.028:734): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:39.033393 kernel: audit: type=1400 audit(1747305939.028:735): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:39.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:39.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:39.038326 kernel: audit: type=1400 audit(1747305939.028:736): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:39.038359 kernel: audit: type=1400 audit(1747305939.028:737): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:39.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:39.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:39.043091 kernel: audit: type=1400 audit(1747305939.028:738): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:39.043130 kernel: audit: type=1400 audit(1747305939.028:739): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:39.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:39.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:39.048263 kernel: audit: type=1400 audit(1747305939.028:740): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:39.048322 kernel: audit: type=1400 audit(1747305939.028:741): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:39.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:39.050514 kernel: audit: type=1400 audit(1747305939.028:742): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:39.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:39.052824 kernel: audit: type=1400 audit(1747305939.028:743): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:39.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:39.028000 audit: BPF prog-id=122 op=LOAD May 15 10:45:39.034000 audit[2910]: AVC avc: denied { bpf } for pid=2910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:39.034000 audit[2910]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2863 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:39.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166303866353666396531313635313337383533656262323831333232 May 15 10:45:39.034000 audit[2910]: AVC avc: denied { perfmon } for pid=2910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:39.034000 audit[2910]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2863 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:39.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166303866353666396531313635313337383533656262323831333232 May 15 10:45:39.034000 audit[2910]: AVC avc: denied { bpf } for pid=2910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:39.034000 audit[2910]: AVC avc: denied { bpf } for pid=2910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:39.034000 audit[2910]: AVC avc: denied { bpf } for pid=2910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:39.034000 audit[2910]: AVC avc: denied { perfmon } for pid=2910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:39.034000 audit[2910]: AVC avc: denied { perfmon } for pid=2910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:39.034000 audit[2910]: AVC avc: denied { perfmon } for pid=2910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:39.034000 audit[2910]: AVC avc: denied { perfmon } for pid=2910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:39.034000 audit[2910]: AVC avc: denied { perfmon } for pid=2910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:39.034000 audit[2910]: AVC avc: denied { bpf } for pid=2910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:39.034000 audit[2910]: AVC avc: denied { bpf } for pid=2910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:39.034000 audit: BPF prog-id=123 op=LOAD May 15 10:45:39.034000 audit[2910]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a1700 items=0 ppid=2863 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:39.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166303866353666396531313635313337383533656262323831333232 May 15 10:45:39.034000 audit[2910]: AVC avc: denied { bpf } for pid=2910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:39.034000 audit[2910]: AVC avc: denied { bpf } for pid=2910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:39.034000 audit[2910]: AVC avc: denied { perfmon } for pid=2910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:39.034000 audit[2910]: AVC avc: denied { perfmon } for pid=2910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:39.034000 audit[2910]: AVC avc: denied { perfmon } for pid=2910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:39.034000 audit[2910]: AVC avc: denied { perfmon } for pid=2910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:39.034000 audit[2910]: AVC avc: denied { perfmon } for pid=2910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:39.034000 audit[2910]: AVC avc: denied { bpf } for pid=2910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:39.034000 audit[2910]: AVC avc: denied { bpf } for pid=2910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:39.034000 audit: BPF prog-id=124 op=LOAD May 15 10:45:39.034000 audit[2910]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000a1748 items=0 ppid=2863 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:39.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166303866353666396531313635313337383533656262323831333232 May 15 10:45:39.039000 audit: BPF prog-id=124 op=UNLOAD May 15 10:45:39.039000 audit: BPF prog-id=123 op=UNLOAD May 15 10:45:39.039000 audit[2910]: AVC avc: denied { bpf } for pid=2910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:39.039000 audit[2910]: AVC avc: denied { bpf } for pid=2910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:39.039000 audit[2910]: AVC avc: denied { bpf } for pid=2910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:39.039000 audit[2910]: AVC avc: denied { perfmon } for pid=2910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:39.039000 audit[2910]: AVC avc: denied { perfmon } for pid=2910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:39.039000 audit[2910]: AVC avc: denied { perfmon } for pid=2910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:39.039000 audit[2910]: AVC avc: denied { perfmon } for pid=2910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:39.039000 audit[2910]: AVC avc: denied { perfmon } for pid=2910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:39.039000 audit[2910]: AVC avc: denied { bpf } for pid=2910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:39.039000 audit[2910]: AVC avc: denied { bpf } for pid=2910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:39.039000 audit: BPF prog-id=125 op=LOAD May 15 10:45:39.039000 audit[2910]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000a1b58 items=0 ppid=2863 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:39.039000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166303866353666396531313635313337383533656262323831333232 May 15 10:45:39.071844 env[1248]: time="2025-05-15T10:45:39.071819948Z" level=info msg="StartContainer for \"1f08f56f9e1165137853ebb2813229634e986c049e5a3286da67688c1936794c\" returns successfully" May 15 10:45:39.089000 audit[2936]: AVC avc: denied { search } for pid=2936 comm="rpcbind" name="crypto" dev="proc" ino=33584 scontext=system_u:system_r:svirt_lxc_net_t:s0:c310,c800 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 15 10:45:39.089000 audit[2936]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f9b57bd70c0 a2=0 a3=0 items=0 ppid=2920 pid=2936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c310,c800 key=(null) May 15 10:45:39.089000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 May 15 10:45:39.111000 audit[2941]: AVC avc: denied { search } for pid=2941 comm="dbus-daemon" name="crypto" dev="proc" ino=33584 scontext=system_u:system_r:svirt_lxc_net_t:s0:c310,c800 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 15 10:45:39.111000 audit[2941]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fbe6f2d20c0 a2=0 a3=0 items=0 ppid=2920 pid=2941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c310,c800 key=(null) May 15 10:45:39.111000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 15 10:45:39.113000 audit[2942]: AVC avc: denied { watch } for pid=2942 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=20165 scontext=system_u:system_r:svirt_lxc_net_t:s0:c310,c800 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c310,c800 tclass=dir permissive=0 May 15 10:45:39.113000 audit[2942]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=564665791800 a2=2c8 a3=7fff79b6981c items=0 ppid=2920 pid=2942 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c310,c800 key=(null) May 15 10:45:39.113000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 15 10:45:39.115000 audit[2943]: AVC avc: denied { read } for pid=2943 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=34340 scontext=system_u:system_r:svirt_lxc_net_t:s0:c310,c800 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 May 15 10:45:39.115000 audit[2943]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7efeb9f3c320 a1=80000 a2=d a3=7ffc26cc28a0 items=0 ppid=2920 pid=2943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c310,c800 key=(null) May 15 10:45:39.115000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 15 10:45:39.116000 audit[2943]: AVC avc: denied { search } for pid=2943 comm="ganesha.nfsd" name="crypto" dev="proc" ino=33584 scontext=system_u:system_r:svirt_lxc_net_t:s0:c310,c800 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 15 10:45:39.116000 audit[2943]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7efeb94900c0 a2=0 a3=0 items=0 ppid=2920 pid=2943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c310,c800 key=(null) May 15 10:45:39.116000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 15 10:45:39.216491 kubelet[1593]: E0515 10:45:39.216458 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:39.447233 kubelet[1593]: I0515 10:45:39.444610 1593 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.585969903 podStartE2EDuration="5.444597042s" podCreationTimestamp="2025-05-15 10:45:34 +0000 UTC" firstStartedPulling="2025-05-15 10:45:35.128877096 +0000 UTC m=+42.389126897" lastFinishedPulling="2025-05-15 10:45:38.987504235 +0000 UTC m=+46.247754036" observedRunningTime="2025-05-15 10:45:39.444552601 +0000 UTC m=+46.704802412" watchObservedRunningTime="2025-05-15 10:45:39.444597042 +0000 UTC m=+46.704846856" May 15 10:45:39.482000 audit[2962]: NETFILTER_CFG table=filter:76 family=2 entries=20 op=nft_register_rule pid=2962 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:45:39.482000 audit[2962]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffc3596dfb0 a2=0 a3=7ffc3596df9c items=0 ppid=1809 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:39.482000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:45:39.488000 audit[2962]: NETFILTER_CFG table=nat:77 family=2 entries=106 op=nft_register_chain pid=2962 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:45:39.488000 audit[2962]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffc3596dfb0 a2=0 a3=7ffc3596df9c items=0 ppid=1809 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:39.488000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:45:40.217419 kubelet[1593]: E0515 10:45:40.217377 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:41.217942 kubelet[1593]: E0515 10:45:41.217913 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:42.218656 kubelet[1593]: E0515 10:45:42.218628 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:43.219830 kubelet[1593]: E0515 10:45:43.219808 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:44.221052 kubelet[1593]: E0515 10:45:44.221015 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:44.354407 systemd[1]: run-containerd-runc-k8s.io-58548b72a348b24cef7de73402d088e128356e4fd877ec05c176bdf4d8a7281c-runc.Nwc10L.mount: Deactivated successfully. May 15 10:45:45.221902 kubelet[1593]: E0515 10:45:45.221868 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:46.223037 kubelet[1593]: E0515 10:45:46.223009 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:47.223542 kubelet[1593]: E0515 10:45:47.223503 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:48.224663 kubelet[1593]: E0515 10:45:48.224636 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:48.957209 systemd[1]: Created slice kubepods-besteffort-pod1974fb60_cdbc_46c2_ac0d_a51a7e1db848.slice. May 15 10:45:49.011766 kubelet[1593]: I0515 10:45:49.011742 1593 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-trmx7\" (UniqueName: \"kubernetes.io/projected/1974fb60-cdbc-46c2-ac0d-a51a7e1db848-kube-api-access-trmx7\") pod \"test-pod-1\" (UID: \"1974fb60-cdbc-46c2-ac0d-a51a7e1db848\") " pod="default/test-pod-1" May 15 10:45:49.011914 kubelet[1593]: I0515 10:45:49.011900 1593 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-64ce4765-fc58-4f03-bba3-59e35af0e8f3\" (UniqueName: \"kubernetes.io/nfs/1974fb60-cdbc-46c2-ac0d-a51a7e1db848-pvc-64ce4765-fc58-4f03-bba3-59e35af0e8f3\") pod \"test-pod-1\" (UID: \"1974fb60-cdbc-46c2-ac0d-a51a7e1db848\") " pod="default/test-pod-1" May 15 10:45:49.140000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.146847 kernel: Failed to create system directory netfs May 15 10:45:49.146892 kernel: kauditd_printk_skb: 68 callbacks suppressed May 15 10:45:49.146911 kernel: audit: type=1400 audit(1747305949.140:759): avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.147600 kernel: Failed to create system directory netfs May 15 10:45:49.147631 kernel: audit: type=1400 audit(1747305949.140:759): avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.140000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.157009 kernel: Failed to create system directory netfs May 15 10:45:49.157205 kernel: Failed to create system directory netfs May 15 10:45:49.157227 kernel: audit: type=1400 audit(1747305949.140:759): avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.157243 kernel: audit: type=1400 audit(1747305949.140:759): avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.140000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.140000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.140000 audit[2993]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55f62ab8d5e0 a1=153bc a2=55f614db72b0 a3=5 items=0 ppid=541 pid=2993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:49.140000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 15 10:45:49.163312 kernel: audit: type=1300 audit(1747305949.140:759): arch=c000003e syscall=175 success=yes exit=0 a0=55f62ab8d5e0 a1=153bc a2=55f614db72b0 a3=5 items=0 ppid=541 pid=2993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:49.163389 kernel: audit: type=1327 audit(1747305949.140:759): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 15 10:45:49.171458 kernel: Failed to create system directory fscache May 15 10:45:49.171541 kernel: audit: type=1400 audit(1747305949.165:760): avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.171564 kernel: Failed to create system directory fscache May 15 10:45:49.165000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.174584 kernel: audit: type=1400 audit(1747305949.165:760): avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.174623 kernel: Failed to create system directory fscache May 15 10:45:49.165000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.177851 kernel: audit: type=1400 audit(1747305949.165:760): avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.177882 kernel: Failed to create system directory fscache May 15 10:45:49.165000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.181121 kernel: audit: type=1400 audit(1747305949.165:760): avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.181153 kernel: Failed to create system directory fscache May 15 10:45:49.165000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.165000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.165000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.182356 kernel: Failed to create system directory fscache May 15 10:45:49.182644 kernel: Failed to create system directory fscache May 15 10:45:49.165000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.165000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.183605 kernel: Failed to create system directory fscache May 15 10:45:49.183631 kernel: Failed to create system directory fscache May 15 10:45:49.165000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.165000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.165000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.185486 kernel: Failed to create system directory fscache May 15 10:45:49.185520 kernel: Failed to create system directory fscache May 15 10:45:49.185543 kernel: Failed to create system directory fscache May 15 10:45:49.165000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.165000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.186730 kernel: Failed to create system directory fscache May 15 10:45:49.186764 kernel: Failed to create system directory fscache May 15 10:45:49.165000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.188503 kernel: FS-Cache: Loaded May 15 10:45:49.165000 audit[2993]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55f62ada29c0 a1=4c0fc a2=55f614db72b0 a3=5 items=0 ppid=541 pid=2993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:49.165000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.212362 kernel: Failed to create system directory sunrpc May 15 10:45:49.212396 kernel: Failed to create system directory sunrpc May 15 10:45:49.212410 kernel: Failed to create system directory sunrpc May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.213575 kernel: Failed to create system directory sunrpc May 15 10:45:49.213605 kernel: Failed to create system directory sunrpc May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.214798 kernel: Failed to create system directory sunrpc May 15 10:45:49.214828 kernel: Failed to create system directory sunrpc May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.216608 kernel: Failed to create system directory sunrpc May 15 10:45:49.216816 kernel: Failed to create system directory sunrpc May 15 10:45:49.216835 kernel: Failed to create system directory sunrpc May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.218442 kernel: Failed to create system directory sunrpc May 15 10:45:49.218470 kernel: Failed to create system directory sunrpc May 15 10:45:49.218497 kernel: Failed to create system directory sunrpc May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.219644 kernel: Failed to create system directory sunrpc May 15 10:45:49.219666 kernel: Failed to create system directory sunrpc May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.221457 kernel: Failed to create system directory sunrpc May 15 10:45:49.221479 kernel: Failed to create system directory sunrpc May 15 10:45:49.221496 kernel: Failed to create system directory sunrpc May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.222664 kernel: Failed to create system directory sunrpc May 15 10:45:49.222692 kernel: Failed to create system directory sunrpc May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.224480 kernel: Failed to create system directory sunrpc May 15 10:45:49.224508 kernel: Failed to create system directory sunrpc May 15 10:45:49.224521 kernel: Failed to create system directory sunrpc May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.225641 kubelet[1593]: E0515 10:45:49.225625 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:49.225827 kernel: Failed to create system directory sunrpc May 15 10:45:49.225845 kernel: Failed to create system directory sunrpc May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.227646 kernel: Failed to create system directory sunrpc May 15 10:45:49.227672 kernel: Failed to create system directory sunrpc May 15 10:45:49.227684 kernel: Failed to create system directory sunrpc May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.229457 kernel: Failed to create system directory sunrpc May 15 10:45:49.229482 kernel: Failed to create system directory sunrpc May 15 10:45:49.229495 kernel: Failed to create system directory sunrpc May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.230660 kernel: Failed to create system directory sunrpc May 15 10:45:49.230686 kernel: Failed to create system directory sunrpc May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.232502 kernel: Failed to create system directory sunrpc May 15 10:45:49.232529 kernel: Failed to create system directory sunrpc May 15 10:45:49.232547 kernel: Failed to create system directory sunrpc May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.234560 kernel: Failed to create system directory sunrpc May 15 10:45:49.234591 kernel: Failed to create system directory sunrpc May 15 10:45:49.234605 kernel: Failed to create system directory sunrpc May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.235775 kernel: Failed to create system directory sunrpc May 15 10:45:49.235801 kernel: Failed to create system directory sunrpc May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.237600 kernel: Failed to create system directory sunrpc May 15 10:45:49.237627 kernel: Failed to create system directory sunrpc May 15 10:45:49.237641 kernel: Failed to create system directory sunrpc May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.239419 kernel: Failed to create system directory sunrpc May 15 10:45:49.239450 kernel: Failed to create system directory sunrpc May 15 10:45:49.239462 kernel: Failed to create system directory sunrpc May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.240628 kernel: Failed to create system directory sunrpc May 15 10:45:49.240653 kernel: Failed to create system directory sunrpc May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.242456 kernel: Failed to create system directory sunrpc May 15 10:45:49.242482 kernel: Failed to create system directory sunrpc May 15 10:45:49.242495 kernel: Failed to create system directory sunrpc May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.243673 kernel: Failed to create system directory sunrpc May 15 10:45:49.243702 kernel: Failed to create system directory sunrpc May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.245514 kernel: Failed to create system directory sunrpc May 15 10:45:49.245541 kernel: Failed to create system directory sunrpc May 15 10:45:49.245558 kernel: Failed to create system directory sunrpc May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.246726 kernel: Failed to create system directory sunrpc May 15 10:45:49.246761 kernel: Failed to create system directory sunrpc May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.248550 kernel: Failed to create system directory sunrpc May 15 10:45:49.248576 kernel: Failed to create system directory sunrpc May 15 10:45:49.248589 kernel: Failed to create system directory sunrpc May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.249761 kernel: Failed to create system directory sunrpc May 15 10:45:49.249787 kernel: Failed to create system directory sunrpc May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.251585 kernel: Failed to create system directory sunrpc May 15 10:45:49.251613 kernel: Failed to create system directory sunrpc May 15 10:45:49.251627 kernel: Failed to create system directory sunrpc May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.252207 kernel: Failed to create system directory sunrpc May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.253402 kernel: Failed to create system directory sunrpc May 15 10:45:49.253658 kernel: Failed to create system directory sunrpc May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.254625 kernel: Failed to create system directory sunrpc May 15 10:45:49.254652 kernel: Failed to create system directory sunrpc May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.256470 kernel: Failed to create system directory sunrpc May 15 10:45:49.256510 kernel: Failed to create system directory sunrpc May 15 10:45:49.256524 kernel: Failed to create system directory sunrpc May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.257761 kernel: Failed to create system directory sunrpc May 15 10:45:49.257796 kernel: Failed to create system directory sunrpc May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.259573 kernel: Failed to create system directory sunrpc May 15 10:45:49.259644 kernel: Failed to create system directory sunrpc May 15 10:45:49.259670 kernel: Failed to create system directory sunrpc May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.260790 kernel: Failed to create system directory sunrpc May 15 10:45:49.260812 kernel: Failed to create system directory sunrpc May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.262590 kernel: Failed to create system directory sunrpc May 15 10:45:49.262617 kernel: Failed to create system directory sunrpc May 15 10:45:49.262634 kernel: Failed to create system directory sunrpc May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.263214 kernel: Failed to create system directory sunrpc May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.264393 kernel: Failed to create system directory sunrpc May 15 10:45:49.264421 kernel: Failed to create system directory sunrpc May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.265607 kernel: Failed to create system directory sunrpc May 15 10:45:49.265633 kernel: Failed to create system directory sunrpc May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.267414 kernel: Failed to create system directory sunrpc May 15 10:45:49.267445 kernel: Failed to create system directory sunrpc May 15 10:45:49.267459 kernel: Failed to create system directory sunrpc May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.268611 kernel: Failed to create system directory sunrpc May 15 10:45:49.268642 kernel: Failed to create system directory sunrpc May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.270412 kernel: Failed to create system directory sunrpc May 15 10:45:49.270443 kernel: Failed to create system directory sunrpc May 15 10:45:49.270457 kernel: Failed to create system directory sunrpc May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.271608 kernel: Failed to create system directory sunrpc May 15 10:45:49.271639 kernel: Failed to create system directory sunrpc May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.273411 kernel: Failed to create system directory sunrpc May 15 10:45:49.273445 kernel: Failed to create system directory sunrpc May 15 10:45:49.273460 kernel: Failed to create system directory sunrpc May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.274625 kernel: Failed to create system directory sunrpc May 15 10:45:49.274653 kernel: Failed to create system directory sunrpc May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.276446 kernel: Failed to create system directory sunrpc May 15 10:45:49.276476 kernel: Failed to create system directory sunrpc May 15 10:45:49.276491 kernel: Failed to create system directory sunrpc May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.277647 kernel: Failed to create system directory sunrpc May 15 10:45:49.277676 kernel: Failed to create system directory sunrpc May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.279460 kernel: Failed to create system directory sunrpc May 15 10:45:49.279491 kernel: Failed to create system directory sunrpc May 15 10:45:49.279505 kernel: Failed to create system directory sunrpc May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.280731 kernel: Failed to create system directory sunrpc May 15 10:45:49.280760 kernel: Failed to create system directory sunrpc May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.282530 kernel: Failed to create system directory sunrpc May 15 10:45:49.282559 kernel: Failed to create system directory sunrpc May 15 10:45:49.282571 kernel: Failed to create system directory sunrpc May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.283727 kernel: Failed to create system directory sunrpc May 15 10:45:49.283754 kernel: Failed to create system directory sunrpc May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.285561 kernel: Failed to create system directory sunrpc May 15 10:45:49.285583 kernel: Failed to create system directory sunrpc May 15 10:45:49.285598 kernel: Failed to create system directory sunrpc May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.286809 kernel: Failed to create system directory sunrpc May 15 10:45:49.286832 kernel: Failed to create system directory sunrpc May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.203000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.288277 kernel: Failed to create system directory sunrpc May 15 10:45:49.294366 kernel: RPC: Registered named UNIX socket transport module. May 15 10:45:49.294393 kernel: RPC: Registered udp transport module. May 15 10:45:49.294413 kernel: RPC: Registered tcp transport module. May 15 10:45:49.295992 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. May 15 10:45:49.203000 audit[2993]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55f62adeead0 a1=1a814c a2=55f614db72b0 a3=5 items=6 ppid=541 pid=2993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:49.203000 audit: CWD cwd="/" May 15 10:45:49.203000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:45:49.203000 audit: PATH item=1 name=(null) inode=34648 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:45:49.203000 audit: PATH item=2 name=(null) inode=34648 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:45:49.203000 audit: PATH item=3 name=(null) inode=34649 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:45:49.203000 audit: PATH item=4 name=(null) inode=34648 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:45:49.203000 audit: PATH item=5 name=(null) inode=34650 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:45:49.203000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.323680 kernel: Failed to create system directory nfs May 15 10:45:49.323918 kernel: Failed to create system directory nfs May 15 10:45:49.323935 kernel: Failed to create system directory nfs May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.325431 kernel: Failed to create system directory nfs May 15 10:45:49.325462 kernel: Failed to create system directory nfs May 15 10:45:49.325475 kernel: Failed to create system directory nfs May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.326559 kernel: Failed to create system directory nfs May 15 10:45:49.326587 kernel: Failed to create system directory nfs May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.327749 kernel: Failed to create system directory nfs May 15 10:45:49.327769 kernel: Failed to create system directory nfs May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.329490 kernel: Failed to create system directory nfs May 15 10:45:49.329511 kernel: Failed to create system directory nfs May 15 10:45:49.329522 kernel: Failed to create system directory nfs May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.330612 kernel: Failed to create system directory nfs May 15 10:45:49.330636 kernel: Failed to create system directory nfs May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.331777 kernel: Failed to create system directory nfs May 15 10:45:49.331801 kernel: Failed to create system directory nfs May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.333485 kernel: Failed to create system directory nfs May 15 10:45:49.333508 kernel: Failed to create system directory nfs May 15 10:45:49.333522 kernel: Failed to create system directory nfs May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.334604 kernel: Failed to create system directory nfs May 15 10:45:49.334629 kernel: Failed to create system directory nfs May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.335774 kernel: Failed to create system directory nfs May 15 10:45:49.335798 kernel: Failed to create system directory nfs May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.337489 kernel: Failed to create system directory nfs May 15 10:45:49.337512 kernel: Failed to create system directory nfs May 15 10:45:49.337524 kernel: Failed to create system directory nfs May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.338610 kernel: Failed to create system directory nfs May 15 10:45:49.338636 kernel: Failed to create system directory nfs May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.339244 kernel: Failed to create system directory nfs May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.340383 kernel: Failed to create system directory nfs May 15 10:45:49.340403 kernel: Failed to create system directory nfs May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.341508 kernel: Failed to create system directory nfs May 15 10:45:49.341532 kernel: Failed to create system directory nfs May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.342646 kernel: Failed to create system directory nfs May 15 10:45:49.342666 kernel: Failed to create system directory nfs May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.344383 kernel: Failed to create system directory nfs May 15 10:45:49.344408 kernel: Failed to create system directory nfs May 15 10:45:49.344420 kernel: Failed to create system directory nfs May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.345536 kernel: Failed to create system directory nfs May 15 10:45:49.345559 kernel: Failed to create system directory nfs May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.346648 kernel: Failed to create system directory nfs May 15 10:45:49.346668 kernel: Failed to create system directory nfs May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.348371 kernel: Failed to create system directory nfs May 15 10:45:49.348394 kernel: Failed to create system directory nfs May 15 10:45:49.348408 kernel: Failed to create system directory nfs May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.349475 kernel: Failed to create system directory nfs May 15 10:45:49.349494 kernel: Failed to create system directory nfs May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.350580 kernel: Failed to create system directory nfs May 15 10:45:49.350603 kernel: Failed to create system directory nfs May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.351734 kernel: Failed to create system directory nfs May 15 10:45:49.351757 kernel: Failed to create system directory nfs May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.353388 kernel: Failed to create system directory nfs May 15 10:45:49.353411 kernel: Failed to create system directory nfs May 15 10:45:49.353423 kernel: Failed to create system directory nfs May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.354502 kernel: Failed to create system directory nfs May 15 10:45:49.354522 kernel: Failed to create system directory nfs May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.355665 kernel: Failed to create system directory nfs May 15 10:45:49.355692 kernel: Failed to create system directory nfs May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.356226 kernel: Failed to create system directory nfs May 15 10:45:49.316000 audit[2993]: AVC avc: denied { confidentiality } for pid=2993 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.316000 audit[2993]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55f62b00fa10 a1=16eae4 a2=55f614db72b0 a3=5 items=0 ppid=541 pid=2993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:49.370269 kernel: FS-Cache: Netfs 'nfs' registered for caching May 15 10:45:49.316000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.402515 kernel: Failed to create system directory nfs4 May 15 10:45:49.402548 kernel: Failed to create system directory nfs4 May 15 10:45:49.402561 kernel: Failed to create system directory nfs4 May 15 10:45:49.402573 kernel: Failed to create system directory nfs4 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.403669 kernel: Failed to create system directory nfs4 May 15 10:45:49.403693 kernel: Failed to create system directory nfs4 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.405458 kernel: Failed to create system directory nfs4 May 15 10:45:49.405485 kernel: Failed to create system directory nfs4 May 15 10:45:49.405499 kernel: Failed to create system directory nfs4 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.406614 kernel: Failed to create system directory nfs4 May 15 10:45:49.406635 kernel: Failed to create system directory nfs4 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.407807 kernel: Failed to create system directory nfs4 May 15 10:45:49.407852 kernel: Failed to create system directory nfs4 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.409759 kernel: Failed to create system directory nfs4 May 15 10:45:49.409784 kernel: Failed to create system directory nfs4 May 15 10:45:49.409797 kernel: Failed to create system directory nfs4 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.410349 kernel: Failed to create system directory nfs4 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.411541 kernel: Failed to create system directory nfs4 May 15 10:45:49.411562 kernel: Failed to create system directory nfs4 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.412735 kernel: Failed to create system directory nfs4 May 15 10:45:49.412765 kernel: Failed to create system directory nfs4 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.413339 kernel: Failed to create system directory nfs4 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.414521 kernel: Failed to create system directory nfs4 May 15 10:45:49.414546 kernel: Failed to create system directory nfs4 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.415707 kernel: Failed to create system directory nfs4 May 15 10:45:49.415735 kernel: Failed to create system directory nfs4 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.416309 kernel: Failed to create system directory nfs4 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.417502 kernel: Failed to create system directory nfs4 May 15 10:45:49.417530 kernel: Failed to create system directory nfs4 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.418710 kernel: Failed to create system directory nfs4 May 15 10:45:49.418737 kernel: Failed to create system directory nfs4 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.420484 kernel: Failed to create system directory nfs4 May 15 10:45:49.420505 kernel: Failed to create system directory nfs4 May 15 10:45:49.420516 kernel: Failed to create system directory nfs4 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.421677 kernel: Failed to create system directory nfs4 May 15 10:45:49.421702 kernel: Failed to create system directory nfs4 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.422270 kernel: Failed to create system directory nfs4 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.423465 kernel: Failed to create system directory nfs4 May 15 10:45:49.423485 kernel: Failed to create system directory nfs4 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.424644 kernel: Failed to create system directory nfs4 May 15 10:45:49.424668 kernel: Failed to create system directory nfs4 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.425252 kernel: Failed to create system directory nfs4 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.426446 kernel: Failed to create system directory nfs4 May 15 10:45:49.426471 kernel: Failed to create system directory nfs4 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.427626 kernel: Failed to create system directory nfs4 May 15 10:45:49.427646 kernel: Failed to create system directory nfs4 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.428235 kernel: Failed to create system directory nfs4 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.429399 kernel: Failed to create system directory nfs4 May 15 10:45:49.429425 kernel: Failed to create system directory nfs4 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.430582 kernel: Failed to create system directory nfs4 May 15 10:45:49.430603 kernel: Failed to create system directory nfs4 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.431757 kernel: Failed to create system directory nfs4 May 15 10:45:49.431777 kernel: Failed to create system directory nfs4 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.432345 kernel: Failed to create system directory nfs4 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.433529 kernel: Failed to create system directory nfs4 May 15 10:45:49.433549 kernel: Failed to create system directory nfs4 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.434731 kernel: Failed to create system directory nfs4 May 15 10:45:49.434757 kernel: Failed to create system directory nfs4 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.435315 kernel: Failed to create system directory nfs4 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.436498 kernel: Failed to create system directory nfs4 May 15 10:45:49.436518 kernel: Failed to create system directory nfs4 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.437662 kernel: Failed to create system directory nfs4 May 15 10:45:49.437685 kernel: Failed to create system directory nfs4 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.439431 kernel: Failed to create system directory nfs4 May 15 10:45:49.439457 kernel: Failed to create system directory nfs4 May 15 10:45:49.439469 kernel: Failed to create system directory nfs4 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.440614 kernel: Failed to create system directory nfs4 May 15 10:45:49.440639 kernel: Failed to create system directory nfs4 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.441784 kernel: Failed to create system directory nfs4 May 15 10:45:49.441806 kernel: Failed to create system directory nfs4 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.442713 kernel: Failed to create system directory nfs4 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.443563 kernel: Failed to create system directory nfs4 May 15 10:45:49.443587 kernel: Failed to create system directory nfs4 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.444730 kernel: Failed to create system directory nfs4 May 15 10:45:49.444754 kernel: Failed to create system directory nfs4 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.445322 kernel: Failed to create system directory nfs4 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.446490 kernel: Failed to create system directory nfs4 May 15 10:45:49.446514 kernel: Failed to create system directory nfs4 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.447667 kernel: Failed to create system directory nfs4 May 15 10:45:49.447695 kernel: Failed to create system directory nfs4 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.449486 kernel: Failed to create system directory nfs4 May 15 10:45:49.449512 kernel: Failed to create system directory nfs4 May 15 10:45:49.449528 kernel: Failed to create system directory nfs4 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.450685 kernel: Failed to create system directory nfs4 May 15 10:45:49.450705 kernel: Failed to create system directory nfs4 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.451281 kernel: Failed to create system directory nfs4 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.452464 kernel: Failed to create system directory nfs4 May 15 10:45:49.452488 kernel: Failed to create system directory nfs4 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.453637 kernel: Failed to create system directory nfs4 May 15 10:45:49.453658 kernel: Failed to create system directory nfs4 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.454230 kernel: Failed to create system directory nfs4 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.455413 kernel: Failed to create system directory nfs4 May 15 10:45:49.455437 kernel: Failed to create system directory nfs4 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.456601 kernel: Failed to create system directory nfs4 May 15 10:45:49.548960 kernel: NFS: Registering the id_resolver key type May 15 10:45:49.549088 kernel: Key type id_resolver registered May 15 10:45:49.549125 kernel: Key type id_legacy registered May 15 10:45:49.389000 audit[2998]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7ffb2be15010 a1=209404 a2=55620a05c2b0 a3=5 items=0 ppid=541 pid=2998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:49.389000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 May 15 10:45:49.612000 audit[2999]: AVC avc: denied { confidentiality } for pid=2999 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.612000 audit[2999]: AVC avc: denied { confidentiality } for pid=2999 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.617728 kernel: Failed to create system directory rpcgss May 15 10:45:49.617762 kernel: Failed to create system directory rpcgss May 15 10:45:49.617778 kernel: Failed to create system directory rpcgss May 15 10:45:49.612000 audit[2999]: AVC avc: denied { confidentiality } for pid=2999 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.618435 kernel: Failed to create system directory rpcgss May 15 10:45:49.612000 audit[2999]: AVC avc: denied { confidentiality } for pid=2999 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.612000 audit[2999]: AVC avc: denied { confidentiality } for pid=2999 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.619737 kernel: Failed to create system directory rpcgss May 15 10:45:49.619760 kernel: Failed to create system directory rpcgss May 15 10:45:49.612000 audit[2999]: AVC avc: denied { confidentiality } for pid=2999 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.620417 kernel: Failed to create system directory rpcgss May 15 10:45:49.612000 audit[2999]: AVC avc: denied { confidentiality } for pid=2999 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.612000 audit[2999]: AVC avc: denied { confidentiality } for pid=2999 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.621718 kernel: Failed to create system directory rpcgss May 15 10:45:49.621744 kernel: Failed to create system directory rpcgss May 15 10:45:49.612000 audit[2999]: AVC avc: denied { confidentiality } for pid=2999 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.622404 kernel: Failed to create system directory rpcgss May 15 10:45:49.612000 audit[2999]: AVC avc: denied { confidentiality } for pid=2999 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.612000 audit[2999]: AVC avc: denied { confidentiality } for pid=2999 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.623732 kernel: Failed to create system directory rpcgss May 15 10:45:49.623758 kernel: Failed to create system directory rpcgss May 15 10:45:49.612000 audit[2999]: AVC avc: denied { confidentiality } for pid=2999 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.624427 kernel: Failed to create system directory rpcgss May 15 10:45:49.612000 audit[2999]: AVC avc: denied { confidentiality } for pid=2999 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.612000 audit[2999]: AVC avc: denied { confidentiality } for pid=2999 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.625747 kernel: Failed to create system directory rpcgss May 15 10:45:49.625772 kernel: Failed to create system directory rpcgss May 15 10:45:49.612000 audit[2999]: AVC avc: denied { confidentiality } for pid=2999 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.626433 kernel: Failed to create system directory rpcgss May 15 10:45:49.612000 audit[2999]: AVC avc: denied { confidentiality } for pid=2999 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.612000 audit[2999]: AVC avc: denied { confidentiality } for pid=2999 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.627738 kernel: Failed to create system directory rpcgss May 15 10:45:49.627764 kernel: Failed to create system directory rpcgss May 15 10:45:49.612000 audit[2999]: AVC avc: denied { confidentiality } for pid=2999 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.628421 kernel: Failed to create system directory rpcgss May 15 10:45:49.612000 audit[2999]: AVC avc: denied { confidentiality } for pid=2999 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.612000 audit[2999]: AVC avc: denied { confidentiality } for pid=2999 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.629743 kernel: Failed to create system directory rpcgss May 15 10:45:49.629767 kernel: Failed to create system directory rpcgss May 15 10:45:49.612000 audit[2999]: AVC avc: denied { confidentiality } for pid=2999 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.630434 kernel: Failed to create system directory rpcgss May 15 10:45:49.612000 audit[2999]: AVC avc: denied { confidentiality } for pid=2999 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.612000 audit[2999]: AVC avc: denied { confidentiality } for pid=2999 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.631742 kernel: Failed to create system directory rpcgss May 15 10:45:49.631766 kernel: Failed to create system directory rpcgss May 15 10:45:49.612000 audit[2999]: AVC avc: denied { confidentiality } for pid=2999 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.632420 kernel: Failed to create system directory rpcgss May 15 10:45:49.612000 audit[2999]: AVC avc: denied { confidentiality } for pid=2999 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.612000 audit[2999]: AVC avc: denied { confidentiality } for pid=2999 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:45:49.633206 kernel: Failed to create system directory rpcgss May 15 10:45:49.612000 audit[2999]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fa29e831010 a1=70b64 a2=56132339c2b0 a3=5 items=0 ppid=541 pid=2999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:49.612000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 May 15 10:45:49.748465 nfsidmap[3006]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' May 15 10:45:49.763051 nfsidmap[3007]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' May 15 10:45:49.770000 audit[1364]: AVC avc: denied { watch_reads } for pid=1364 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2459 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 15 10:45:49.770000 audit[1364]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=560492358490 a2=10 a3=d63d6d99030687b8 items=0 ppid=1 pid=1364 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:49.770000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 15 10:45:49.770000 audit[1364]: AVC avc: denied { watch_reads } for pid=1364 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2459 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 15 10:45:49.770000 audit[1364]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=560492358490 a2=10 a3=d63d6d99030687b8 items=0 ppid=1 pid=1364 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:49.770000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 15 10:45:49.770000 audit[1364]: AVC avc: denied { watch_reads } for pid=1364 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2459 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 15 10:45:49.770000 audit[1364]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=560492358490 a2=10 a3=d63d6d99030687b8 items=0 ppid=1 pid=1364 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:49.770000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 15 10:45:49.770000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2459 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 15 10:45:49.770000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2459 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 15 10:45:49.770000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2459 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 15 10:45:49.860432 env[1248]: time="2025-05-15T10:45:49.860358942Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:1974fb60-cdbc-46c2-ac0d-a51a7e1db848,Namespace:default,Attempt:0,}" May 15 10:45:50.208384 systemd-networkd[1064]: cali5ec59c6bf6e: Link UP May 15 10:45:50.210953 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 10:45:50.211017 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready May 15 10:45:50.210844 systemd-networkd[1064]: cali5ec59c6bf6e: Gained carrier May 15 10:45:50.221559 env[1248]: 2025-05-15 10:45:50.156 [INFO][3008] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.124.136-k8s-test--pod--1-eth0 default 1974fb60-cdbc-46c2-ac0d-a51a7e1db848 1231 0 2025-05-15 10:45:35 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.67.124.136 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="414707328ae5d1de8f532f43e1c04cfc4a6f7e96b20ad40d7c5db9b7ac517697" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.136-k8s-test--pod--1-" May 15 10:45:50.221559 env[1248]: 2025-05-15 10:45:50.156 [INFO][3008] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="414707328ae5d1de8f532f43e1c04cfc4a6f7e96b20ad40d7c5db9b7ac517697" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.136-k8s-test--pod--1-eth0" May 15 10:45:50.221559 env[1248]: 2025-05-15 10:45:50.178 [INFO][3020] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="414707328ae5d1de8f532f43e1c04cfc4a6f7e96b20ad40d7c5db9b7ac517697" HandleID="k8s-pod-network.414707328ae5d1de8f532f43e1c04cfc4a6f7e96b20ad40d7c5db9b7ac517697" Workload="10.67.124.136-k8s-test--pod--1-eth0" May 15 10:45:50.221559 env[1248]: 2025-05-15 10:45:50.184 [INFO][3020] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="414707328ae5d1de8f532f43e1c04cfc4a6f7e96b20ad40d7c5db9b7ac517697" HandleID="k8s-pod-network.414707328ae5d1de8f532f43e1c04cfc4a6f7e96b20ad40d7c5db9b7ac517697" Workload="10.67.124.136-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031ab50), Attrs:map[string]string{"namespace":"default", "node":"10.67.124.136", "pod":"test-pod-1", "timestamp":"2025-05-15 10:45:50.178126705 +0000 UTC"}, Hostname:"10.67.124.136", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:45:50.221559 env[1248]: 2025-05-15 10:45:50.184 [INFO][3020] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:45:50.221559 env[1248]: 2025-05-15 10:45:50.184 [INFO][3020] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:45:50.221559 env[1248]: 2025-05-15 10:45:50.184 [INFO][3020] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.124.136' May 15 10:45:50.221559 env[1248]: 2025-05-15 10:45:50.185 [INFO][3020] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.414707328ae5d1de8f532f43e1c04cfc4a6f7e96b20ad40d7c5db9b7ac517697" host="10.67.124.136" May 15 10:45:50.221559 env[1248]: 2025-05-15 10:45:50.187 [INFO][3020] ipam/ipam.go 372: Looking up existing affinities for host host="10.67.124.136" May 15 10:45:50.221559 env[1248]: 2025-05-15 10:45:50.190 [INFO][3020] ipam/ipam.go 489: Trying affinity for 192.168.52.192/26 host="10.67.124.136" May 15 10:45:50.221559 env[1248]: 2025-05-15 10:45:50.191 [INFO][3020] ipam/ipam.go 155: Attempting to load block cidr=192.168.52.192/26 host="10.67.124.136" May 15 10:45:50.221559 env[1248]: 2025-05-15 10:45:50.192 [INFO][3020] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.52.192/26 host="10.67.124.136" May 15 10:45:50.221559 env[1248]: 2025-05-15 10:45:50.192 [INFO][3020] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.52.192/26 handle="k8s-pod-network.414707328ae5d1de8f532f43e1c04cfc4a6f7e96b20ad40d7c5db9b7ac517697" host="10.67.124.136" May 15 10:45:50.221559 env[1248]: 2025-05-15 10:45:50.193 [INFO][3020] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.414707328ae5d1de8f532f43e1c04cfc4a6f7e96b20ad40d7c5db9b7ac517697 May 15 10:45:50.221559 env[1248]: 2025-05-15 10:45:50.197 [INFO][3020] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.52.192/26 handle="k8s-pod-network.414707328ae5d1de8f532f43e1c04cfc4a6f7e96b20ad40d7c5db9b7ac517697" host="10.67.124.136" May 15 10:45:50.221559 env[1248]: 2025-05-15 10:45:50.201 [INFO][3020] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.52.196/26] block=192.168.52.192/26 handle="k8s-pod-network.414707328ae5d1de8f532f43e1c04cfc4a6f7e96b20ad40d7c5db9b7ac517697" host="10.67.124.136" May 15 10:45:50.221559 env[1248]: 2025-05-15 10:45:50.201 [INFO][3020] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.52.196/26] handle="k8s-pod-network.414707328ae5d1de8f532f43e1c04cfc4a6f7e96b20ad40d7c5db9b7ac517697" host="10.67.124.136" May 15 10:45:50.221559 env[1248]: 2025-05-15 10:45:50.201 [INFO][3020] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:45:50.221559 env[1248]: 2025-05-15 10:45:50.201 [INFO][3020] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.52.196/26] IPv6=[] ContainerID="414707328ae5d1de8f532f43e1c04cfc4a6f7e96b20ad40d7c5db9b7ac517697" HandleID="k8s-pod-network.414707328ae5d1de8f532f43e1c04cfc4a6f7e96b20ad40d7c5db9b7ac517697" Workload="10.67.124.136-k8s-test--pod--1-eth0" May 15 10:45:50.221559 env[1248]: 2025-05-15 10:45:50.202 [INFO][3008] cni-plugin/k8s.go 386: Populated endpoint ContainerID="414707328ae5d1de8f532f43e1c04cfc4a6f7e96b20ad40d7c5db9b7ac517697" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.136-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.136-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"1974fb60-cdbc-46c2-ac0d-a51a7e1db848", ResourceVersion:"1231", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 45, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.136", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.52.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:45:50.222180 env[1248]: 2025-05-15 10:45:50.203 [INFO][3008] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.52.196/32] ContainerID="414707328ae5d1de8f532f43e1c04cfc4a6f7e96b20ad40d7c5db9b7ac517697" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.136-k8s-test--pod--1-eth0" May 15 10:45:50.222180 env[1248]: 2025-05-15 10:45:50.203 [INFO][3008] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="414707328ae5d1de8f532f43e1c04cfc4a6f7e96b20ad40d7c5db9b7ac517697" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.136-k8s-test--pod--1-eth0" May 15 10:45:50.222180 env[1248]: 2025-05-15 10:45:50.215 [INFO][3008] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="414707328ae5d1de8f532f43e1c04cfc4a6f7e96b20ad40d7c5db9b7ac517697" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.136-k8s-test--pod--1-eth0" May 15 10:45:50.222180 env[1248]: 2025-05-15 10:45:50.215 [INFO][3008] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="414707328ae5d1de8f532f43e1c04cfc4a6f7e96b20ad40d7c5db9b7ac517697" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.136-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.136-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"1974fb60-cdbc-46c2-ac0d-a51a7e1db848", ResourceVersion:"1231", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 45, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.136", ContainerID:"414707328ae5d1de8f532f43e1c04cfc4a6f7e96b20ad40d7c5db9b7ac517697", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.52.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"f2:32:bb:a8:3f:d4", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:45:50.222180 env[1248]: 2025-05-15 10:45:50.220 [INFO][3008] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="414707328ae5d1de8f532f43e1c04cfc4a6f7e96b20ad40d7c5db9b7ac517697" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.124.136-k8s-test--pod--1-eth0" May 15 10:45:50.228673 kubelet[1593]: E0515 10:45:50.228384 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:50.229000 audit[3040]: NETFILTER_CFG table=filter:78 family=2 entries=34 op=nft_register_chain pid=3040 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:45:50.229000 audit[3040]: SYSCALL arch=c000003e syscall=46 success=yes exit=18232 a0=3 a1=7ffc9eb77500 a2=0 a3=7ffc9eb774ec items=0 ppid=2267 pid=3040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:50.229000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:45:50.240913 env[1248]: time="2025-05-15T10:45:50.240871011Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:45:50.241033 env[1248]: time="2025-05-15T10:45:50.241018424Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:45:50.241094 env[1248]: time="2025-05-15T10:45:50.241081190Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:45:50.241441 env[1248]: time="2025-05-15T10:45:50.241375486Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/414707328ae5d1de8f532f43e1c04cfc4a6f7e96b20ad40d7c5db9b7ac517697 pid=3049 runtime=io.containerd.runc.v2 May 15 10:45:50.256312 systemd[1]: run-containerd-runc-k8s.io-414707328ae5d1de8f532f43e1c04cfc4a6f7e96b20ad40d7c5db9b7ac517697-runc.I85Wjy.mount: Deactivated successfully. May 15 10:45:50.258384 systemd[1]: Started cri-containerd-414707328ae5d1de8f532f43e1c04cfc4a6f7e96b20ad40d7c5db9b7ac517697.scope. May 15 10:45:50.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.267000 audit: BPF prog-id=126 op=LOAD May 15 10:45:50.268000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.268000 audit[3059]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3049 pid=3059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:50.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431343730373332386165356431646538663533326634336531633034 May 15 10:45:50.268000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.268000 audit[3059]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=3049 pid=3059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:50.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431343730373332386165356431646538663533326634336531633034 May 15 10:45:50.268000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.268000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.268000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.268000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.268000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.268000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.268000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.268000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.268000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.268000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.268000 audit: BPF prog-id=127 op=LOAD May 15 10:45:50.268000 audit[3059]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0003a7070 items=0 ppid=3049 pid=3059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:50.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431343730373332386165356431646538663533326634336531633034 May 15 10:45:50.268000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.268000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.268000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.268000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.268000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.268000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.268000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.268000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.268000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.268000 audit: BPF prog-id=128 op=LOAD May 15 10:45:50.268000 audit[3059]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0003a70b8 items=0 ppid=3049 pid=3059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:50.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431343730373332386165356431646538663533326634336531633034 May 15 10:45:50.268000 audit: BPF prog-id=128 op=UNLOAD May 15 10:45:50.268000 audit: BPF prog-id=127 op=UNLOAD May 15 10:45:50.268000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.268000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.268000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.268000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.268000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.268000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.268000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.268000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.268000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.268000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.268000 audit: BPF prog-id=129 op=LOAD May 15 10:45:50.268000 audit[3059]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0003a74c8 items=0 ppid=3049 pid=3059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:50.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431343730373332386165356431646538663533326634336531633034 May 15 10:45:50.271749 systemd-resolved[1194]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:45:50.291630 env[1248]: time="2025-05-15T10:45:50.291606337Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:1974fb60-cdbc-46c2-ac0d-a51a7e1db848,Namespace:default,Attempt:0,} returns sandbox id \"414707328ae5d1de8f532f43e1c04cfc4a6f7e96b20ad40d7c5db9b7ac517697\"" May 15 10:45:50.292550 env[1248]: time="2025-05-15T10:45:50.292538566Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 15 10:45:50.723809 env[1248]: time="2025-05-15T10:45:50.723776234Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:45:50.724540 env[1248]: time="2025-05-15T10:45:50.724524666Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:45:50.725506 env[1248]: time="2025-05-15T10:45:50.725492061Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:45:50.728431 env[1248]: time="2025-05-15T10:45:50.728414554Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:45:50.728841 env[1248]: time="2025-05-15T10:45:50.728825080Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa\"" May 15 10:45:50.730262 env[1248]: time="2025-05-15T10:45:50.730247508Z" level=info msg="CreateContainer within sandbox \"414707328ae5d1de8f532f43e1c04cfc4a6f7e96b20ad40d7c5db9b7ac517697\" for container &ContainerMetadata{Name:test,Attempt:0,}" May 15 10:45:50.744087 env[1248]: time="2025-05-15T10:45:50.744055065Z" level=info msg="CreateContainer within sandbox \"414707328ae5d1de8f532f43e1c04cfc4a6f7e96b20ad40d7c5db9b7ac517697\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"646c09cd1f959df07e55b4b2c0766a8232aabc82cde66f75d4320b069e0def85\"" May 15 10:45:50.744647 env[1248]: time="2025-05-15T10:45:50.744624192Z" level=info msg="StartContainer for \"646c09cd1f959df07e55b4b2c0766a8232aabc82cde66f75d4320b069e0def85\"" May 15 10:45:50.753883 systemd[1]: Started cri-containerd-646c09cd1f959df07e55b4b2c0766a8232aabc82cde66f75d4320b069e0def85.scope. May 15 10:45:50.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.762000 audit: BPF prog-id=130 op=LOAD May 15 10:45:50.762000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.762000 audit[3093]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3049 pid=3093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:50.762000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634366330396364316639353964663037653535623462326330373636 May 15 10:45:50.763000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.763000 audit[3093]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3049 pid=3093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:50.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634366330396364316639353964663037653535623462326330373636 May 15 10:45:50.763000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.763000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.763000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.763000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.763000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.763000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.763000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.763000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.763000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.763000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.763000 audit: BPF prog-id=131 op=LOAD May 15 10:45:50.763000 audit[3093]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000203270 items=0 ppid=3049 pid=3093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:50.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634366330396364316639353964663037653535623462326330373636 May 15 10:45:50.763000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.763000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.763000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.763000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.763000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.763000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.763000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.763000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.763000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.763000 audit: BPF prog-id=132 op=LOAD May 15 10:45:50.763000 audit[3093]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002032b8 items=0 ppid=3049 pid=3093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:50.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634366330396364316639353964663037653535623462326330373636 May 15 10:45:50.764000 audit: BPF prog-id=132 op=UNLOAD May 15 10:45:50.764000 audit: BPF prog-id=131 op=UNLOAD May 15 10:45:50.764000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.764000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.764000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.764000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.764000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.764000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.764000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.764000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.764000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.764000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:45:50.764000 audit: BPF prog-id=133 op=LOAD May 15 10:45:50.764000 audit[3093]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0002036c8 items=0 ppid=3049 pid=3093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:45:50.764000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634366330396364316639353964663037653535623462326330373636 May 15 10:45:50.774944 env[1248]: time="2025-05-15T10:45:50.774918649Z" level=info msg="StartContainer for \"646c09cd1f959df07e55b4b2c0766a8232aabc82cde66f75d4320b069e0def85\" returns successfully" May 15 10:45:51.229378 kubelet[1593]: E0515 10:45:51.229348 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:51.246865 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount258696998.mount: Deactivated successfully. May 15 10:45:51.345389 systemd-networkd[1064]: cali5ec59c6bf6e: Gained IPv6LL May 15 10:45:51.460107 kubelet[1593]: I0515 10:45:51.460031 1593 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=16.022921593 podStartE2EDuration="16.460020568s" podCreationTimestamp="2025-05-15 10:45:35 +0000 UTC" firstStartedPulling="2025-05-15 10:45:50.292380324 +0000 UTC m=+57.552630124" lastFinishedPulling="2025-05-15 10:45:50.729479298 +0000 UTC m=+57.989729099" observedRunningTime="2025-05-15 10:45:51.459821396 +0000 UTC m=+58.720071202" watchObservedRunningTime="2025-05-15 10:45:51.460020568 +0000 UTC m=+58.720270379" May 15 10:45:52.229427 kubelet[1593]: E0515 10:45:52.229394 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:53.180815 kubelet[1593]: E0515 10:45:53.180788 1593 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:53.213037 env[1248]: time="2025-05-15T10:45:53.213014847Z" level=info msg="StopPodSandbox for \"9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765\"" May 15 10:45:53.230263 kubelet[1593]: E0515 10:45:53.230234 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:45:53.254964 env[1248]: 2025-05-15 10:45:53.234 [WARNING][3154] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.136-k8s-nginx--deployment--7fcdb87857--xl57b-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"761f3c7f-9dda-42c0-a797-28c5ac5e3509", ResourceVersion:"1139", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 45, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.136", ContainerID:"86cbcbc66c2ec3dfec29b04cc16828988268547976c9bda18e5af91550d08e96", Pod:"nginx-deployment-7fcdb87857-xl57b", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.52.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5a60e4f3963", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:45:53.254964 env[1248]: 2025-05-15 10:45:53.234 [INFO][3154] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765" May 15 10:45:53.254964 env[1248]: 2025-05-15 10:45:53.234 [INFO][3154] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765" iface="eth0" netns="" May 15 10:45:53.254964 env[1248]: 2025-05-15 10:45:53.234 [INFO][3154] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765" May 15 10:45:53.254964 env[1248]: 2025-05-15 10:45:53.234 [INFO][3154] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765" May 15 10:45:53.254964 env[1248]: 2025-05-15 10:45:53.248 [INFO][3161] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765" HandleID="k8s-pod-network.9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765" Workload="10.67.124.136-k8s-nginx--deployment--7fcdb87857--xl57b-eth0" May 15 10:45:53.254964 env[1248]: 2025-05-15 10:45:53.248 [INFO][3161] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:45:53.254964 env[1248]: 2025-05-15 10:45:53.248 [INFO][3161] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:45:53.254964 env[1248]: 2025-05-15 10:45:53.252 [WARNING][3161] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765" HandleID="k8s-pod-network.9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765" Workload="10.67.124.136-k8s-nginx--deployment--7fcdb87857--xl57b-eth0" May 15 10:45:53.254964 env[1248]: 2025-05-15 10:45:53.252 [INFO][3161] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765" HandleID="k8s-pod-network.9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765" Workload="10.67.124.136-k8s-nginx--deployment--7fcdb87857--xl57b-eth0" May 15 10:45:53.254964 env[1248]: 2025-05-15 10:45:53.253 [INFO][3161] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:45:53.254964 env[1248]: 2025-05-15 10:45:53.254 [INFO][3154] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765" May 15 10:45:53.255597 env[1248]: time="2025-05-15T10:45:53.255041320Z" level=info msg="TearDown network for sandbox \"9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765\" successfully" May 15 10:45:53.255597 env[1248]: time="2025-05-15T10:45:53.255063461Z" level=info msg="StopPodSandbox for \"9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765\" returns successfully" May 15 10:45:53.255710 env[1248]: time="2025-05-15T10:45:53.255696398Z" level=info msg="RemovePodSandbox for \"9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765\"" May 15 10:45:53.255792 env[1248]: time="2025-05-15T10:45:53.255766824Z" level=info msg="Forcibly stopping sandbox \"9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765\"" May 15 10:45:53.314696 env[1248]: 2025-05-15 10:45:53.279 [WARNING][3180] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.136-k8s-nginx--deployment--7fcdb87857--xl57b-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"761f3c7f-9dda-42c0-a797-28c5ac5e3509", ResourceVersion:"1139", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 45, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.136", ContainerID:"86cbcbc66c2ec3dfec29b04cc16828988268547976c9bda18e5af91550d08e96", Pod:"nginx-deployment-7fcdb87857-xl57b", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.52.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5a60e4f3963", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:45:53.314696 env[1248]: 2025-05-15 10:45:53.280 [INFO][3180] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765" May 15 10:45:53.314696 env[1248]: 2025-05-15 10:45:53.280 [INFO][3180] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765" iface="eth0" netns="" May 15 10:45:53.314696 env[1248]: 2025-05-15 10:45:53.280 [INFO][3180] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765" May 15 10:45:53.314696 env[1248]: 2025-05-15 10:45:53.280 [INFO][3180] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765" May 15 10:45:53.314696 env[1248]: 2025-05-15 10:45:53.292 [INFO][3187] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765" HandleID="k8s-pod-network.9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765" Workload="10.67.124.136-k8s-nginx--deployment--7fcdb87857--xl57b-eth0" May 15 10:45:53.314696 env[1248]: 2025-05-15 10:45:53.292 [INFO][3187] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:45:53.314696 env[1248]: 2025-05-15 10:45:53.292 [INFO][3187] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:45:53.314696 env[1248]: 2025-05-15 10:45:53.310 [WARNING][3187] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765" HandleID="k8s-pod-network.9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765" Workload="10.67.124.136-k8s-nginx--deployment--7fcdb87857--xl57b-eth0" May 15 10:45:53.314696 env[1248]: 2025-05-15 10:45:53.310 [INFO][3187] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765" HandleID="k8s-pod-network.9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765" Workload="10.67.124.136-k8s-nginx--deployment--7fcdb87857--xl57b-eth0" May 15 10:45:53.314696 env[1248]: 2025-05-15 10:45:53.311 [INFO][3187] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:45:53.314696 env[1248]: 2025-05-15 10:45:53.313 [INFO][3180] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765" May 15 10:45:53.314696 env[1248]: time="2025-05-15T10:45:53.314666175Z" level=info msg="TearDown network for sandbox \"9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765\" successfully" May 15 10:45:53.316573 env[1248]: time="2025-05-15T10:45:53.316556204Z" level=info msg="RemovePodSandbox \"9c9104112926198b7d390dacc3a1c8322f779d873528f38e746ba1ca6dbfa765\" returns successfully" May 15 10:45:53.316847 env[1248]: time="2025-05-15T10:45:53.316829017Z" level=info msg="StopPodSandbox for \"a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8\"" May 15 10:45:53.364331 env[1248]: 2025-05-15 10:45:53.345 [WARNING][3209] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.136-k8s-csi--node--driver--ltzxd-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"9e0bf444-ae9d-48a1-95c6-b12cd232dbd4", ResourceVersion:"1109", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 44, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.136", ContainerID:"8004900860a352ad72c22d25050c2dc84ca955a63f75bdfed33dd9b739cdaa43", Pod:"csi-node-driver-ltzxd", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.52.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali5b0ed8e0c57", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:45:53.364331 env[1248]: 2025-05-15 10:45:53.345 [INFO][3209] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8" May 15 10:45:53.364331 env[1248]: 2025-05-15 10:45:53.345 [INFO][3209] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8" iface="eth0" netns="" May 15 10:45:53.364331 env[1248]: 2025-05-15 10:45:53.345 [INFO][3209] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8" May 15 10:45:53.364331 env[1248]: 2025-05-15 10:45:53.345 [INFO][3209] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8" May 15 10:45:53.364331 env[1248]: 2025-05-15 10:45:53.357 [INFO][3216] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8" HandleID="k8s-pod-network.a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8" Workload="10.67.124.136-k8s-csi--node--driver--ltzxd-eth0" May 15 10:45:53.364331 env[1248]: 2025-05-15 10:45:53.357 [INFO][3216] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:45:53.364331 env[1248]: 2025-05-15 10:45:53.357 [INFO][3216] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:45:53.364331 env[1248]: 2025-05-15 10:45:53.362 [WARNING][3216] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8" HandleID="k8s-pod-network.a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8" Workload="10.67.124.136-k8s-csi--node--driver--ltzxd-eth0" May 15 10:45:53.364331 env[1248]: 2025-05-15 10:45:53.362 [INFO][3216] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8" HandleID="k8s-pod-network.a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8" Workload="10.67.124.136-k8s-csi--node--driver--ltzxd-eth0" May 15 10:45:53.364331 env[1248]: 2025-05-15 10:45:53.362 [INFO][3216] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:45:53.364331 env[1248]: 2025-05-15 10:45:53.363 [INFO][3209] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8" May 15 10:45:53.364687 env[1248]: time="2025-05-15T10:45:53.364347538Z" level=info msg="TearDown network for sandbox \"a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8\" successfully" May 15 10:45:53.364687 env[1248]: time="2025-05-15T10:45:53.364368841Z" level=info msg="StopPodSandbox for \"a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8\" returns successfully" May 15 10:45:53.364843 env[1248]: time="2025-05-15T10:45:53.364828975Z" level=info msg="RemovePodSandbox for \"a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8\"" May 15 10:45:53.364999 env[1248]: time="2025-05-15T10:45:53.364942398Z" level=info msg="Forcibly stopping sandbox \"a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8\"" May 15 10:45:53.404312 env[1248]: 2025-05-15 10:45:53.385 [WARNING][3234] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.124.136-k8s-csi--node--driver--ltzxd-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"9e0bf444-ae9d-48a1-95c6-b12cd232dbd4", ResourceVersion:"1109", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 44, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.124.136", ContainerID:"8004900860a352ad72c22d25050c2dc84ca955a63f75bdfed33dd9b739cdaa43", Pod:"csi-node-driver-ltzxd", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.52.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali5b0ed8e0c57", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:45:53.404312 env[1248]: 2025-05-15 10:45:53.385 [INFO][3234] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8" May 15 10:45:53.404312 env[1248]: 2025-05-15 10:45:53.385 [INFO][3234] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8" iface="eth0" netns="" May 15 10:45:53.404312 env[1248]: 2025-05-15 10:45:53.385 [INFO][3234] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8" May 15 10:45:53.404312 env[1248]: 2025-05-15 10:45:53.385 [INFO][3234] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8" May 15 10:45:53.404312 env[1248]: 2025-05-15 10:45:53.397 [INFO][3241] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8" HandleID="k8s-pod-network.a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8" Workload="10.67.124.136-k8s-csi--node--driver--ltzxd-eth0" May 15 10:45:53.404312 env[1248]: 2025-05-15 10:45:53.397 [INFO][3241] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:45:53.404312 env[1248]: 2025-05-15 10:45:53.397 [INFO][3241] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:45:53.404312 env[1248]: 2025-05-15 10:45:53.402 [WARNING][3241] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8" HandleID="k8s-pod-network.a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8" Workload="10.67.124.136-k8s-csi--node--driver--ltzxd-eth0" May 15 10:45:53.404312 env[1248]: 2025-05-15 10:45:53.402 [INFO][3241] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8" HandleID="k8s-pod-network.a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8" Workload="10.67.124.136-k8s-csi--node--driver--ltzxd-eth0" May 15 10:45:53.404312 env[1248]: 2025-05-15 10:45:53.403 [INFO][3241] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:45:53.404312 env[1248]: 2025-05-15 10:45:53.403 [INFO][3234] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8" May 15 10:45:53.404820 env[1248]: time="2025-05-15T10:45:53.404747049Z" level=info msg="TearDown network for sandbox \"a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8\" successfully" May 15 10:45:53.442279 env[1248]: time="2025-05-15T10:45:53.442190654Z" level=info msg="RemovePodSandbox \"a80be446b7ade83c64f94d2b7d62df16a0f7b83356f4723f5973fa05cd59c0b8\" returns successfully" May 15 10:45:54.231293 kubelet[1593]: E0515 10:45:54.231259 1593 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"