May 15 10:21:43.730831 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] May 15 10:21:43.730851 kernel: Linux version 5.15.182-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Thu May 15 09:09:56 -00 2025 May 15 10:21:43.730859 kernel: efi: EFI v2.70 by EDK II May 15 10:21:43.730865 kernel: efi: SMBIOS 3.0=0xd9260000 ACPI 2.0=0xd9240000 MEMATTR=0xda32b018 RNG=0xd9220018 MEMRESERVE=0xd9521c18 May 15 10:21:43.730871 kernel: random: crng init done May 15 10:21:43.730876 kernel: ACPI: Early table checksum verification disabled May 15 10:21:43.730883 kernel: ACPI: RSDP 0x00000000D9240000 000024 (v02 BOCHS ) May 15 10:21:43.730890 kernel: ACPI: XSDT 0x00000000D9230000 000064 (v01 BOCHS BXPC 00000001 01000013) May 15 10:21:43.730901 kernel: ACPI: FACP 0x00000000D91E0000 000114 (v06 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:21:43.730907 kernel: ACPI: DSDT 0x00000000D91F0000 0014A2 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:21:43.730913 kernel: ACPI: APIC 0x00000000D91D0000 0001A8 (v04 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:21:43.730918 kernel: ACPI: PPTT 0x00000000D91C0000 00009C (v02 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:21:43.730924 kernel: ACPI: GTDT 0x00000000D91B0000 000060 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:21:43.733067 kernel: ACPI: MCFG 0x00000000D91A0000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:21:43.733085 kernel: ACPI: SPCR 0x00000000D9190000 000050 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:21:43.733099 kernel: ACPI: DBG2 0x00000000D9180000 000057 (v00 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:21:43.733105 kernel: ACPI: IORT 0x00000000D9170000 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:21:43.733111 kernel: ACPI: SPCR: console: pl011,mmio,0x9000000,9600 May 15 10:21:43.733117 kernel: NUMA: Failed to initialise from firmware May 15 10:21:43.733123 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000000dcffffff] May 15 10:21:43.733129 kernel: NUMA: NODE_DATA [mem 0xdcb0b900-0xdcb10fff] May 15 10:21:43.733135 kernel: Zone ranges: May 15 10:21:43.733141 kernel: DMA [mem 0x0000000040000000-0x00000000dcffffff] May 15 10:21:43.733148 kernel: DMA32 empty May 15 10:21:43.733154 kernel: Normal empty May 15 10:21:43.733160 kernel: Movable zone start for each node May 15 10:21:43.733165 kernel: Early memory node ranges May 15 10:21:43.733171 kernel: node 0: [mem 0x0000000040000000-0x00000000d924ffff] May 15 10:21:43.733177 kernel: node 0: [mem 0x00000000d9250000-0x00000000d951ffff] May 15 10:21:43.733183 kernel: node 0: [mem 0x00000000d9520000-0x00000000dc7fffff] May 15 10:21:43.733188 kernel: node 0: [mem 0x00000000dc800000-0x00000000dc88ffff] May 15 10:21:43.733194 kernel: node 0: [mem 0x00000000dc890000-0x00000000dc89ffff] May 15 10:21:43.733200 kernel: node 0: [mem 0x00000000dc8a0000-0x00000000dc9bffff] May 15 10:21:43.733205 kernel: node 0: [mem 0x00000000dc9c0000-0x00000000dcffffff] May 15 10:21:43.733211 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000000dcffffff] May 15 10:21:43.733218 kernel: On node 0, zone DMA: 12288 pages in unavailable ranges May 15 10:21:43.733224 kernel: psci: probing for conduit method from ACPI. May 15 10:21:43.733230 kernel: psci: PSCIv1.1 detected in firmware. May 15 10:21:43.733235 kernel: psci: Using standard PSCI v0.2 function IDs May 15 10:21:43.733241 kernel: psci: Trusted OS migration not required May 15 10:21:43.733249 kernel: psci: SMC Calling Convention v1.1 May 15 10:21:43.733256 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000003) May 15 10:21:43.733263 kernel: ACPI: SRAT not present May 15 10:21:43.733270 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 May 15 10:21:43.733276 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 May 15 10:21:43.733282 kernel: pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 May 15 10:21:43.733288 kernel: Detected PIPT I-cache on CPU0 May 15 10:21:43.733294 kernel: CPU features: detected: GIC system register CPU interface May 15 10:21:43.733300 kernel: CPU features: detected: Hardware dirty bit management May 15 10:21:43.733306 kernel: CPU features: detected: Spectre-v4 May 15 10:21:43.733312 kernel: CPU features: detected: Spectre-BHB May 15 10:21:43.733320 kernel: CPU features: kernel page table isolation forced ON by KASLR May 15 10:21:43.733326 kernel: CPU features: detected: Kernel page table isolation (KPTI) May 15 10:21:43.733332 kernel: CPU features: detected: ARM erratum 1418040 May 15 10:21:43.733338 kernel: CPU features: detected: SSBS not fully self-synchronizing May 15 10:21:43.733344 kernel: Built 1 zonelists, mobility grouping on. Total pages: 633024 May 15 10:21:43.733350 kernel: Policy zone: DMA May 15 10:21:43.733357 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=aa29d2e9841b6b978238db9eff73afa5af149616ae25608914babb265d82dda7 May 15 10:21:43.733364 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 15 10:21:43.733370 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 15 10:21:43.733376 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 15 10:21:43.733382 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 15 10:21:43.733390 kernel: Memory: 2457404K/2572288K available (9792K kernel code, 2094K rwdata, 7584K rodata, 36416K init, 777K bss, 114884K reserved, 0K cma-reserved) May 15 10:21:43.733396 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 May 15 10:21:43.733402 kernel: trace event string verifier disabled May 15 10:21:43.733408 kernel: rcu: Preemptible hierarchical RCU implementation. May 15 10:21:43.733415 kernel: rcu: RCU event tracing is enabled. May 15 10:21:43.733421 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. May 15 10:21:43.733427 kernel: Trampoline variant of Tasks RCU enabled. May 15 10:21:43.733434 kernel: Tracing variant of Tasks RCU enabled. May 15 10:21:43.733440 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 15 10:21:43.733446 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 May 15 10:21:43.733452 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 May 15 10:21:43.733459 kernel: GICv3: 256 SPIs implemented May 15 10:21:43.733465 kernel: GICv3: 0 Extended SPIs implemented May 15 10:21:43.733471 kernel: GICv3: Distributor has no Range Selector support May 15 10:21:43.733477 kernel: Root IRQ handler: gic_handle_irq May 15 10:21:43.733483 kernel: GICv3: 16 PPIs implemented May 15 10:21:43.733489 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000080a0000 May 15 10:21:43.733495 kernel: ACPI: SRAT not present May 15 10:21:43.733501 kernel: ITS [mem 0x08080000-0x0809ffff] May 15 10:21:43.733508 kernel: ITS@0x0000000008080000: allocated 8192 Devices @400b0000 (indirect, esz 8, psz 64K, shr 1) May 15 10:21:43.733514 kernel: ITS@0x0000000008080000: allocated 8192 Interrupt Collections @400c0000 (flat, esz 8, psz 64K, shr 1) May 15 10:21:43.733520 kernel: GICv3: using LPI property table @0x00000000400d0000 May 15 10:21:43.733526 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000000400e0000 May 15 10:21:43.733534 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 15 10:21:43.733540 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). May 15 10:21:43.733546 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns May 15 10:21:43.733552 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns May 15 10:21:43.733558 kernel: arm-pv: using stolen time PV May 15 10:21:43.733565 kernel: Console: colour dummy device 80x25 May 15 10:21:43.733571 kernel: ACPI: Core revision 20210730 May 15 10:21:43.733578 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) May 15 10:21:43.733584 kernel: pid_max: default: 32768 minimum: 301 May 15 10:21:43.733590 kernel: LSM: Security Framework initializing May 15 10:21:43.733598 kernel: SELinux: Initializing. May 15 10:21:43.733605 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 15 10:21:43.733611 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 15 10:21:43.733617 kernel: ACPI PPTT: PPTT table found, but unable to locate core 3 (3) May 15 10:21:43.733624 kernel: rcu: Hierarchical SRCU implementation. May 15 10:21:43.733630 kernel: Platform MSI: ITS@0x8080000 domain created May 15 10:21:43.733636 kernel: PCI/MSI: ITS@0x8080000 domain created May 15 10:21:43.733643 kernel: Remapping and enabling EFI services. May 15 10:21:43.733649 kernel: smp: Bringing up secondary CPUs ... May 15 10:21:43.733657 kernel: Detected PIPT I-cache on CPU1 May 15 10:21:43.733663 kernel: GICv3: CPU1: found redistributor 1 region 0:0x00000000080c0000 May 15 10:21:43.733670 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000000400f0000 May 15 10:21:43.733676 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 15 10:21:43.733682 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] May 15 10:21:43.733689 kernel: Detected PIPT I-cache on CPU2 May 15 10:21:43.733695 kernel: GICv3: CPU2: found redistributor 2 region 0:0x00000000080e0000 May 15 10:21:43.733702 kernel: GICv3: CPU2: using allocated LPI pending table @0x0000000040100000 May 15 10:21:43.733708 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 15 10:21:43.733714 kernel: CPU2: Booted secondary processor 0x0000000002 [0x413fd0c1] May 15 10:21:43.733722 kernel: Detected PIPT I-cache on CPU3 May 15 10:21:43.733728 kernel: GICv3: CPU3: found redistributor 3 region 0:0x0000000008100000 May 15 10:21:43.733734 kernel: GICv3: CPU3: using allocated LPI pending table @0x0000000040110000 May 15 10:21:43.733741 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 15 10:21:43.733751 kernel: CPU3: Booted secondary processor 0x0000000003 [0x413fd0c1] May 15 10:21:43.733759 kernel: smp: Brought up 1 node, 4 CPUs May 15 10:21:43.733766 kernel: SMP: Total of 4 processors activated. May 15 10:21:43.733772 kernel: CPU features: detected: 32-bit EL0 Support May 15 10:21:43.733779 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence May 15 10:21:43.733786 kernel: CPU features: detected: Common not Private translations May 15 10:21:43.733792 kernel: CPU features: detected: CRC32 instructions May 15 10:21:43.733799 kernel: CPU features: detected: RCpc load-acquire (LDAPR) May 15 10:21:43.733806 kernel: CPU features: detected: LSE atomic instructions May 15 10:21:43.733813 kernel: CPU features: detected: Privileged Access Never May 15 10:21:43.733820 kernel: CPU features: detected: RAS Extension Support May 15 10:21:43.733827 kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS) May 15 10:21:43.733833 kernel: CPU: All CPU(s) started at EL1 May 15 10:21:43.733841 kernel: alternatives: patching kernel code May 15 10:21:43.733848 kernel: devtmpfs: initialized May 15 10:21:43.733855 kernel: KASLR enabled May 15 10:21:43.733861 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 15 10:21:43.733868 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) May 15 10:21:43.733875 kernel: pinctrl core: initialized pinctrl subsystem May 15 10:21:43.733881 kernel: SMBIOS 3.0.0 present. May 15 10:21:43.733888 kernel: DMI: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 May 15 10:21:43.733894 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 15 10:21:43.733903 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations May 15 10:21:43.733910 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations May 15 10:21:43.733916 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations May 15 10:21:43.733923 kernel: audit: initializing netlink subsys (disabled) May 15 10:21:43.733930 kernel: audit: type=2000 audit(0.030:1): state=initialized audit_enabled=0 res=1 May 15 10:21:43.733936 kernel: thermal_sys: Registered thermal governor 'step_wise' May 15 10:21:43.733943 kernel: cpuidle: using governor menu May 15 10:21:43.733949 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. May 15 10:21:43.733956 kernel: ASID allocator initialised with 32768 entries May 15 10:21:43.733963 kernel: ACPI: bus type PCI registered May 15 10:21:43.733970 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 15 10:21:43.733977 kernel: Serial: AMBA PL011 UART driver May 15 10:21:43.733983 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 15 10:21:43.733990 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages May 15 10:21:43.733996 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 15 10:21:43.734003 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages May 15 10:21:43.734009 kernel: cryptd: max_cpu_qlen set to 1000 May 15 10:21:43.734016 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) May 15 10:21:43.734024 kernel: ACPI: Added _OSI(Module Device) May 15 10:21:43.734031 kernel: ACPI: Added _OSI(Processor Device) May 15 10:21:43.734037 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 15 10:21:43.734044 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 15 10:21:43.734050 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 15 10:21:43.734057 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 15 10:21:43.734063 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 15 10:21:43.734070 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 15 10:21:43.734077 kernel: ACPI: Interpreter enabled May 15 10:21:43.734102 kernel: ACPI: Using GIC for interrupt routing May 15 10:21:43.734109 kernel: ACPI: MCFG table detected, 1 entries May 15 10:21:43.734116 kernel: ARMH0011:00: ttyAMA0 at MMIO 0x9000000 (irq = 12, base_baud = 0) is a SBSA May 15 10:21:43.734123 kernel: printk: console [ttyAMA0] enabled May 15 10:21:43.734129 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 15 10:21:43.734267 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 15 10:21:43.734332 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] May 15 10:21:43.734414 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] May 15 10:21:43.734475 kernel: acpi PNP0A08:00: ECAM area [mem 0x4010000000-0x401fffffff] reserved by PNP0C02:00 May 15 10:21:43.734534 kernel: acpi PNP0A08:00: ECAM at [mem 0x4010000000-0x401fffffff] for [bus 00-ff] May 15 10:21:43.734543 kernel: ACPI: Remapped I/O 0x000000003eff0000 to [io 0x0000-0xffff window] May 15 10:21:43.734550 kernel: PCI host bridge to bus 0000:00 May 15 10:21:43.734618 kernel: pci_bus 0000:00: root bus resource [mem 0x10000000-0x3efeffff window] May 15 10:21:43.734674 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] May 15 10:21:43.734729 kernel: pci_bus 0000:00: root bus resource [mem 0x8000000000-0xffffffffff window] May 15 10:21:43.734785 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 15 10:21:43.734858 kernel: pci 0000:00:00.0: [1b36:0008] type 00 class 0x060000 May 15 10:21:43.734934 kernel: pci 0000:00:01.0: [1af4:1005] type 00 class 0x00ff00 May 15 10:21:43.734997 kernel: pci 0000:00:01.0: reg 0x10: [io 0x0000-0x001f] May 15 10:21:43.735059 kernel: pci 0000:00:01.0: reg 0x14: [mem 0x10000000-0x10000fff] May 15 10:21:43.735162 kernel: pci 0000:00:01.0: reg 0x20: [mem 0x8000000000-0x8000003fff 64bit pref] May 15 10:21:43.735228 kernel: pci 0000:00:01.0: BAR 4: assigned [mem 0x8000000000-0x8000003fff 64bit pref] May 15 10:21:43.735288 kernel: pci 0000:00:01.0: BAR 1: assigned [mem 0x10000000-0x10000fff] May 15 10:21:43.735348 kernel: pci 0000:00:01.0: BAR 0: assigned [io 0x1000-0x101f] May 15 10:21:43.735403 kernel: pci_bus 0000:00: resource 4 [mem 0x10000000-0x3efeffff window] May 15 10:21:43.735457 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] May 15 10:21:43.735511 kernel: pci_bus 0000:00: resource 6 [mem 0x8000000000-0xffffffffff window] May 15 10:21:43.735520 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 May 15 10:21:43.735527 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 May 15 10:21:43.735536 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 May 15 10:21:43.735543 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 May 15 10:21:43.735550 kernel: iommu: Default domain type: Translated May 15 10:21:43.735556 kernel: iommu: DMA domain TLB invalidation policy: strict mode May 15 10:21:43.735563 kernel: vgaarb: loaded May 15 10:21:43.735569 kernel: pps_core: LinuxPPS API ver. 1 registered May 15 10:21:43.735576 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 15 10:21:43.735583 kernel: PTP clock support registered May 15 10:21:43.735590 kernel: Registered efivars operations May 15 10:21:43.735598 kernel: clocksource: Switched to clocksource arch_sys_counter May 15 10:21:43.735604 kernel: VFS: Disk quotas dquot_6.6.0 May 15 10:21:43.735611 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 15 10:21:43.735618 kernel: pnp: PnP ACPI init May 15 10:21:43.735684 kernel: system 00:00: [mem 0x4010000000-0x401fffffff window] could not be reserved May 15 10:21:43.735693 kernel: pnp: PnP ACPI: found 1 devices May 15 10:21:43.735700 kernel: NET: Registered PF_INET protocol family May 15 10:21:43.735707 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 15 10:21:43.735715 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 15 10:21:43.735722 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 15 10:21:43.735729 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 15 10:21:43.735736 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 15 10:21:43.735742 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 15 10:21:43.735749 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 15 10:21:43.735756 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 15 10:21:43.735762 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 15 10:21:43.735769 kernel: PCI: CLS 0 bytes, default 64 May 15 10:21:43.735777 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 7 counters available May 15 10:21:43.735783 kernel: kvm [1]: HYP mode not available May 15 10:21:43.735790 kernel: Initialise system trusted keyrings May 15 10:21:43.735796 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 15 10:21:43.735803 kernel: Key type asymmetric registered May 15 10:21:43.735810 kernel: Asymmetric key parser 'x509' registered May 15 10:21:43.735816 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 15 10:21:43.735823 kernel: io scheduler mq-deadline registered May 15 10:21:43.735830 kernel: io scheduler kyber registered May 15 10:21:43.735837 kernel: io scheduler bfq registered May 15 10:21:43.735844 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 May 15 10:21:43.735851 kernel: ACPI: button: Power Button [PWRB] May 15 10:21:43.735858 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 May 15 10:21:43.735917 kernel: virtio-pci 0000:00:01.0: enabling device (0005 -> 0007) May 15 10:21:43.735926 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 15 10:21:43.735933 kernel: thunder_xcv, ver 1.0 May 15 10:21:43.735939 kernel: thunder_bgx, ver 1.0 May 15 10:21:43.735946 kernel: nicpf, ver 1.0 May 15 10:21:43.735954 kernel: nicvf, ver 1.0 May 15 10:21:43.736022 kernel: rtc-efi rtc-efi.0: registered as rtc0 May 15 10:21:43.736086 kernel: rtc-efi rtc-efi.0: setting system clock to 2025-05-15T10:21:43 UTC (1747304503) May 15 10:21:43.736105 kernel: hid: raw HID events driver (C) Jiri Kosina May 15 10:21:43.736112 kernel: NET: Registered PF_INET6 protocol family May 15 10:21:43.736118 kernel: Segment Routing with IPv6 May 15 10:21:43.736125 kernel: In-situ OAM (IOAM) with IPv6 May 15 10:21:43.736131 kernel: NET: Registered PF_PACKET protocol family May 15 10:21:43.736141 kernel: Key type dns_resolver registered May 15 10:21:43.736147 kernel: registered taskstats version 1 May 15 10:21:43.736154 kernel: Loading compiled-in X.509 certificates May 15 10:21:43.736160 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.182-flatcar: 3679cbfb4d4756a2ddc177f0eaedea33fb5fdf2e' May 15 10:21:43.736167 kernel: Key type .fscrypt registered May 15 10:21:43.736173 kernel: Key type fscrypt-provisioning registered May 15 10:21:43.736180 kernel: ima: No TPM chip found, activating TPM-bypass! May 15 10:21:43.736186 kernel: ima: Allocated hash algorithm: sha1 May 15 10:21:43.736193 kernel: ima: No architecture policies found May 15 10:21:43.736201 kernel: clk: Disabling unused clocks May 15 10:21:43.736207 kernel: Freeing unused kernel memory: 36416K May 15 10:21:43.736214 kernel: Run /init as init process May 15 10:21:43.736220 kernel: with arguments: May 15 10:21:43.736226 kernel: /init May 15 10:21:43.736233 kernel: with environment: May 15 10:21:43.736239 kernel: HOME=/ May 15 10:21:43.736245 kernel: TERM=linux May 15 10:21:43.736252 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 15 10:21:43.736262 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 15 10:21:43.736270 systemd[1]: Detected virtualization kvm. May 15 10:21:43.736277 systemd[1]: Detected architecture arm64. May 15 10:21:43.736284 systemd[1]: Running in initrd. May 15 10:21:43.736291 systemd[1]: No hostname configured, using default hostname. May 15 10:21:43.736298 systemd[1]: Hostname set to . May 15 10:21:43.736305 systemd[1]: Initializing machine ID from VM UUID. May 15 10:21:43.736313 systemd[1]: Queued start job for default target initrd.target. May 15 10:21:43.736320 systemd[1]: Started systemd-ask-password-console.path. May 15 10:21:43.736327 systemd[1]: Reached target cryptsetup.target. May 15 10:21:43.736334 systemd[1]: Reached target paths.target. May 15 10:21:43.736342 systemd[1]: Reached target slices.target. May 15 10:21:43.736349 systemd[1]: Reached target swap.target. May 15 10:21:43.736356 systemd[1]: Reached target timers.target. May 15 10:21:43.736363 systemd[1]: Listening on iscsid.socket. May 15 10:21:43.736371 systemd[1]: Listening on iscsiuio.socket. May 15 10:21:43.736378 systemd[1]: Listening on systemd-journald-audit.socket. May 15 10:21:43.736385 systemd[1]: Listening on systemd-journald-dev-log.socket. May 15 10:21:43.736393 systemd[1]: Listening on systemd-journald.socket. May 15 10:21:43.736400 systemd[1]: Listening on systemd-networkd.socket. May 15 10:21:43.736407 systemd[1]: Listening on systemd-udevd-control.socket. May 15 10:21:43.736414 systemd[1]: Listening on systemd-udevd-kernel.socket. May 15 10:21:43.736422 systemd[1]: Reached target sockets.target. May 15 10:21:43.736430 systemd[1]: Starting kmod-static-nodes.service... May 15 10:21:43.736437 systemd[1]: Finished network-cleanup.service. May 15 10:21:43.736444 systemd[1]: Starting systemd-fsck-usr.service... May 15 10:21:43.736451 systemd[1]: Starting systemd-journald.service... May 15 10:21:43.736458 systemd[1]: Starting systemd-modules-load.service... May 15 10:21:43.736465 systemd[1]: Starting systemd-resolved.service... May 15 10:21:43.736472 systemd[1]: Starting systemd-vconsole-setup.service... May 15 10:21:43.736479 systemd[1]: Finished kmod-static-nodes.service. May 15 10:21:43.736486 systemd[1]: Finished systemd-fsck-usr.service. May 15 10:21:43.736494 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 15 10:21:43.736501 systemd[1]: Finished systemd-vconsole-setup.service. May 15 10:21:43.736508 systemd[1]: Starting dracut-cmdline-ask.service... May 15 10:21:43.736515 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 15 10:21:43.736523 kernel: audit: type=1130 audit(1747304503.730:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:43.736533 systemd-journald[289]: Journal started May 15 10:21:43.736576 systemd-journald[289]: Runtime Journal (/run/log/journal/3a681d0e4c754306a5fd7c2a7a6e1994) is 6.0M, max 48.7M, 42.6M free. May 15 10:21:43.730000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:43.724645 systemd-modules-load[290]: Inserted module 'overlay' May 15 10:21:43.742029 systemd[1]: Started systemd-journald.service. May 15 10:21:43.742057 kernel: audit: type=1130 audit(1747304503.738:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:43.738000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:43.739954 systemd-resolved[291]: Positive Trust Anchors: May 15 10:21:43.739961 systemd-resolved[291]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 15 10:21:43.739988 systemd-resolved[291]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 15 10:21:43.748283 systemd-resolved[291]: Defaulting to hostname 'linux'. May 15 10:21:43.755141 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 15 10:21:43.755161 kernel: audit: type=1130 audit(1747304503.752:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:43.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:43.750888 systemd[1]: Started systemd-resolved.service. May 15 10:21:43.757152 kernel: Bridge firewalling registered May 15 10:21:43.752648 systemd[1]: Reached target nss-lookup.target. May 15 10:21:43.756279 systemd-modules-load[290]: Inserted module 'br_netfilter' May 15 10:21:43.760321 systemd[1]: Finished dracut-cmdline-ask.service. May 15 10:21:43.764325 kernel: audit: type=1130 audit(1747304503.760:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:43.760000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:43.761798 systemd[1]: Starting dracut-cmdline.service... May 15 10:21:43.771149 kernel: SCSI subsystem initialized May 15 10:21:43.773528 dracut-cmdline[308]: dracut-dracut-053 May 15 10:21:43.776053 dracut-cmdline[308]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=aa29d2e9841b6b978238db9eff73afa5af149616ae25608914babb265d82dda7 May 15 10:21:43.782458 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 15 10:21:43.782506 kernel: device-mapper: uevent: version 1.0.3 May 15 10:21:43.782516 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 15 10:21:43.784763 systemd-modules-load[290]: Inserted module 'dm_multipath' May 15 10:21:43.785565 systemd[1]: Finished systemd-modules-load.service. May 15 10:21:43.789141 kernel: audit: type=1130 audit(1747304503.786:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:43.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:43.787453 systemd[1]: Starting systemd-sysctl.service... May 15 10:21:43.796225 systemd[1]: Finished systemd-sysctl.service. May 15 10:21:43.799141 kernel: audit: type=1130 audit(1747304503.796:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:43.796000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:43.837113 kernel: Loading iSCSI transport class v2.0-870. May 15 10:21:43.849121 kernel: iscsi: registered transport (tcp) May 15 10:21:43.866116 kernel: iscsi: registered transport (qla4xxx) May 15 10:21:43.866167 kernel: QLogic iSCSI HBA Driver May 15 10:21:43.905675 systemd[1]: Finished dracut-cmdline.service. May 15 10:21:43.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:43.907207 systemd[1]: Starting dracut-pre-udev.service... May 15 10:21:43.909633 kernel: audit: type=1130 audit(1747304503.906:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:43.954112 kernel: raid6: neonx8 gen() 13772 MB/s May 15 10:21:43.971102 kernel: raid6: neonx8 xor() 10801 MB/s May 15 10:21:43.988113 kernel: raid6: neonx4 gen() 13541 MB/s May 15 10:21:44.005104 kernel: raid6: neonx4 xor() 11171 MB/s May 15 10:21:44.022102 kernel: raid6: neonx2 gen() 13022 MB/s May 15 10:21:44.039107 kernel: raid6: neonx2 xor() 10318 MB/s May 15 10:21:44.056107 kernel: raid6: neonx1 gen() 10579 MB/s May 15 10:21:44.073107 kernel: raid6: neonx1 xor() 8760 MB/s May 15 10:21:44.090104 kernel: raid6: int64x8 gen() 6265 MB/s May 15 10:21:44.107103 kernel: raid6: int64x8 xor() 3543 MB/s May 15 10:21:44.124108 kernel: raid6: int64x4 gen() 7214 MB/s May 15 10:21:44.141106 kernel: raid6: int64x4 xor() 3847 MB/s May 15 10:21:44.158106 kernel: raid6: int64x2 gen() 6149 MB/s May 15 10:21:44.175102 kernel: raid6: int64x2 xor() 3317 MB/s May 15 10:21:44.192104 kernel: raid6: int64x1 gen() 5040 MB/s May 15 10:21:44.209325 kernel: raid6: int64x1 xor() 2645 MB/s May 15 10:21:44.209346 kernel: raid6: using algorithm neonx8 gen() 13772 MB/s May 15 10:21:44.209355 kernel: raid6: .... xor() 10801 MB/s, rmw enabled May 15 10:21:44.209372 kernel: raid6: using neon recovery algorithm May 15 10:21:44.220115 kernel: xor: measuring software checksum speed May 15 10:21:44.220135 kernel: 8regs : 17224 MB/sec May 15 10:21:44.221146 kernel: 32regs : 20717 MB/sec May 15 10:21:44.221158 kernel: arm64_neon : 27889 MB/sec May 15 10:21:44.221166 kernel: xor: using function: arm64_neon (27889 MB/sec) May 15 10:21:44.283123 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no May 15 10:21:44.292981 systemd[1]: Finished dracut-pre-udev.service. May 15 10:21:44.296581 kernel: audit: type=1130 audit(1747304504.293:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:44.296600 kernel: audit: type=1334 audit(1747304504.295:10): prog-id=7 op=LOAD May 15 10:21:44.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:44.295000 audit: BPF prog-id=7 op=LOAD May 15 10:21:44.296000 audit: BPF prog-id=8 op=LOAD May 15 10:21:44.296904 systemd[1]: Starting systemd-udevd.service... May 15 10:21:44.309028 systemd-udevd[491]: Using default interface naming scheme 'v252'. May 15 10:21:44.312317 systemd[1]: Started systemd-udevd.service. May 15 10:21:44.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:44.314063 systemd[1]: Starting dracut-pre-trigger.service... May 15 10:21:44.325383 dracut-pre-trigger[498]: rd.md=0: removing MD RAID activation May 15 10:21:44.353947 systemd[1]: Finished dracut-pre-trigger.service. May 15 10:21:44.354000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:44.355491 systemd[1]: Starting systemd-udev-trigger.service... May 15 10:21:44.389282 systemd[1]: Finished systemd-udev-trigger.service. May 15 10:21:44.389000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:44.418720 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) May 15 10:21:44.425950 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 15 10:21:44.425974 kernel: GPT:9289727 != 19775487 May 15 10:21:44.425984 kernel: GPT:Alternate GPT header not at the end of the disk. May 15 10:21:44.425992 kernel: GPT:9289727 != 19775487 May 15 10:21:44.426002 kernel: GPT: Use GNU Parted to correct GPT errors. May 15 10:21:44.426011 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 10:21:44.440129 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (544) May 15 10:21:44.444259 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 15 10:21:44.445065 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 15 10:21:44.448964 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 15 10:21:44.452241 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 15 10:21:44.455427 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 15 10:21:44.457359 systemd[1]: Starting disk-uuid.service... May 15 10:21:44.463627 disk-uuid[561]: Primary Header is updated. May 15 10:21:44.463627 disk-uuid[561]: Secondary Entries is updated. May 15 10:21:44.463627 disk-uuid[561]: Secondary Header is updated. May 15 10:21:44.467106 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 10:21:45.478631 disk-uuid[562]: The operation has completed successfully. May 15 10:21:45.479756 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 10:21:45.502922 systemd[1]: disk-uuid.service: Deactivated successfully. May 15 10:21:45.503000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:45.503000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:45.503017 systemd[1]: Finished disk-uuid.service. May 15 10:21:45.504656 systemd[1]: Starting verity-setup.service... May 15 10:21:45.518144 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" May 15 10:21:45.538414 systemd[1]: Found device dev-mapper-usr.device. May 15 10:21:45.540566 systemd[1]: Mounting sysusr-usr.mount... May 15 10:21:45.542317 systemd[1]: Finished verity-setup.service. May 15 10:21:45.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:45.589963 systemd[1]: Mounted sysusr-usr.mount. May 15 10:21:45.591174 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 15 10:21:45.590831 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 15 10:21:45.591571 systemd[1]: Starting ignition-setup.service... May 15 10:21:45.593375 systemd[1]: Starting parse-ip-for-networkd.service... May 15 10:21:45.601515 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm May 15 10:21:45.601557 kernel: BTRFS info (device vda6): using free space tree May 15 10:21:45.601568 kernel: BTRFS info (device vda6): has skinny extents May 15 10:21:45.610908 systemd[1]: mnt-oem.mount: Deactivated successfully. May 15 10:21:45.616329 systemd[1]: Finished ignition-setup.service. May 15 10:21:45.616000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:45.617633 systemd[1]: Starting ignition-fetch-offline.service... May 15 10:21:45.680083 systemd[1]: Finished parse-ip-for-networkd.service. May 15 10:21:45.680000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:45.681000 audit: BPF prog-id=9 op=LOAD May 15 10:21:45.681944 systemd[1]: Starting systemd-networkd.service... May 15 10:21:45.702141 ignition[651]: Ignition 2.14.0 May 15 10:21:45.702152 ignition[651]: Stage: fetch-offline May 15 10:21:45.702469 systemd-networkd[738]: lo: Link UP May 15 10:21:45.704000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:45.702198 ignition[651]: no configs at "/usr/lib/ignition/base.d" May 15 10:21:45.702473 systemd-networkd[738]: lo: Gained carrier May 15 10:21:45.702208 ignition[651]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:21:45.702820 systemd-networkd[738]: Enumeration completed May 15 10:21:45.702341 ignition[651]: parsed url from cmdline: "" May 15 10:21:45.702917 systemd[1]: Started systemd-networkd.service. May 15 10:21:45.702344 ignition[651]: no config URL provided May 15 10:21:45.702995 systemd-networkd[738]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 15 10:21:45.702349 ignition[651]: reading system config file "/usr/lib/ignition/user.ign" May 15 10:21:45.704028 systemd-networkd[738]: eth0: Link UP May 15 10:21:45.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:45.702355 ignition[651]: no config at "/usr/lib/ignition/user.ign" May 15 10:21:45.704031 systemd-networkd[738]: eth0: Gained carrier May 15 10:21:45.702372 ignition[651]: op(1): [started] loading QEMU firmware config module May 15 10:21:45.704307 systemd[1]: Reached target network.target. May 15 10:21:45.702376 ignition[651]: op(1): executing: "modprobe" "qemu_fw_cfg" May 15 10:21:45.706137 systemd[1]: Starting iscsiuio.service... May 15 10:21:45.708969 ignition[651]: op(1): [finished] loading QEMU firmware config module May 15 10:21:45.721710 iscsid[745]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 15 10:21:45.721710 iscsid[745]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 15 10:21:45.721710 iscsid[745]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 15 10:21:45.721710 iscsid[745]: If using hardware iscsi like qla4xxx this message can be ignored. May 15 10:21:45.721710 iscsid[745]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 15 10:21:45.721710 iscsid[745]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 15 10:21:45.727000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:45.715235 systemd[1]: Started iscsiuio.service. May 15 10:21:45.728408 ignition[651]: parsing config with SHA512: 4d4f7fdc77cccb304282daf6e51a6ed1857d07624ec914b15d4d05ce3a1d2f0ab41ed16b35e97a83f01dbee7f260339d77fb447635deae4a3b80c6cd279ee933 May 15 10:21:45.717222 systemd[1]: Starting iscsid.service... May 15 10:21:45.723208 systemd[1]: Started iscsid.service. May 15 10:21:45.728318 systemd[1]: Starting dracut-initqueue.service... May 15 10:21:45.732568 systemd-networkd[738]: eth0: DHCPv4 address 10.0.0.109/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 15 10:21:45.736228 unknown[651]: fetched base config from "system" May 15 10:21:45.736242 unknown[651]: fetched user config from "qemu" May 15 10:21:45.737495 ignition[651]: fetch-offline: fetch-offline passed May 15 10:21:45.737558 ignition[651]: Ignition finished successfully May 15 10:21:45.738811 systemd[1]: Finished ignition-fetch-offline.service. May 15 10:21:45.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:45.739750 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 15 10:21:45.740413 systemd[1]: Starting ignition-kargs.service... May 15 10:21:45.742422 systemd[1]: Finished dracut-initqueue.service. May 15 10:21:45.743072 systemd[1]: Reached target remote-fs-pre.target. May 15 10:21:45.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:45.744026 systemd[1]: Reached target remote-cryptsetup.target. May 15 10:21:45.745107 systemd[1]: Reached target remote-fs.target. May 15 10:21:45.746811 systemd[1]: Starting dracut-pre-mount.service... May 15 10:21:45.749076 ignition[754]: Ignition 2.14.0 May 15 10:21:45.749115 ignition[754]: Stage: kargs May 15 10:21:45.749206 ignition[754]: no configs at "/usr/lib/ignition/base.d" May 15 10:21:45.749216 ignition[754]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:21:45.749845 ignition[754]: kargs: kargs passed May 15 10:21:45.749883 ignition[754]: Ignition finished successfully May 15 10:21:45.752309 systemd[1]: Finished ignition-kargs.service. May 15 10:21:45.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:45.753676 systemd[1]: Starting ignition-disks.service... May 15 10:21:45.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:45.756639 systemd[1]: Finished dracut-pre-mount.service. May 15 10:21:45.760102 ignition[763]: Ignition 2.14.0 May 15 10:21:45.760113 ignition[763]: Stage: disks May 15 10:21:45.760197 ignition[763]: no configs at "/usr/lib/ignition/base.d" May 15 10:21:45.760207 ignition[763]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:21:45.760847 ignition[763]: disks: disks passed May 15 10:21:45.760883 ignition[763]: Ignition finished successfully May 15 10:21:45.762909 systemd[1]: Finished ignition-disks.service. May 15 10:21:45.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:45.764058 systemd[1]: Reached target initrd-root-device.target. May 15 10:21:45.765049 systemd[1]: Reached target local-fs-pre.target. May 15 10:21:45.766168 systemd[1]: Reached target local-fs.target. May 15 10:21:45.767125 systemd[1]: Reached target sysinit.target. May 15 10:21:45.768054 systemd[1]: Reached target basic.target. May 15 10:21:45.769779 systemd[1]: Starting systemd-fsck-root.service... May 15 10:21:45.780152 systemd-fsck[773]: ROOT: clean, 623/553520 files, 56022/553472 blocks May 15 10:21:45.783660 systemd[1]: Finished systemd-fsck-root.service. May 15 10:21:45.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:45.786029 systemd[1]: Mounting sysroot.mount... May 15 10:21:45.792115 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 15 10:21:45.792356 systemd[1]: Mounted sysroot.mount. May 15 10:21:45.792978 systemd[1]: Reached target initrd-root-fs.target. May 15 10:21:45.794936 systemd[1]: Mounting sysroot-usr.mount... May 15 10:21:45.795738 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 15 10:21:45.795777 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 15 10:21:45.795798 systemd[1]: Reached target ignition-diskful.target. May 15 10:21:45.797534 systemd[1]: Mounted sysroot-usr.mount. May 15 10:21:45.798837 systemd[1]: Starting initrd-setup-root.service... May 15 10:21:45.802897 initrd-setup-root[783]: cut: /sysroot/etc/passwd: No such file or directory May 15 10:21:45.807220 initrd-setup-root[791]: cut: /sysroot/etc/group: No such file or directory May 15 10:21:45.810678 initrd-setup-root[799]: cut: /sysroot/etc/shadow: No such file or directory May 15 10:21:45.814611 initrd-setup-root[807]: cut: /sysroot/etc/gshadow: No such file or directory May 15 10:21:45.839467 systemd[1]: Finished initrd-setup-root.service. May 15 10:21:45.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:45.840859 systemd[1]: Starting ignition-mount.service... May 15 10:21:45.842141 systemd[1]: Starting sysroot-boot.service... May 15 10:21:45.845929 bash[824]: umount: /sysroot/usr/share/oem: not mounted. May 15 10:21:45.853489 ignition[825]: INFO : Ignition 2.14.0 May 15 10:21:45.853489 ignition[825]: INFO : Stage: mount May 15 10:21:45.855368 ignition[825]: INFO : no configs at "/usr/lib/ignition/base.d" May 15 10:21:45.855368 ignition[825]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:21:45.855368 ignition[825]: INFO : mount: mount passed May 15 10:21:45.855368 ignition[825]: INFO : Ignition finished successfully May 15 10:21:45.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:45.857385 systemd[1]: Finished ignition-mount.service. May 15 10:21:45.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:45.858720 systemd[1]: Finished sysroot-boot.service. May 15 10:21:46.549046 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 15 10:21:46.555393 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (834) May 15 10:21:46.555420 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm May 15 10:21:46.556156 kernel: BTRFS info (device vda6): using free space tree May 15 10:21:46.556174 kernel: BTRFS info (device vda6): has skinny extents May 15 10:21:46.559297 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 15 10:21:46.560834 systemd[1]: Starting ignition-files.service... May 15 10:21:46.574972 ignition[854]: INFO : Ignition 2.14.0 May 15 10:21:46.574972 ignition[854]: INFO : Stage: files May 15 10:21:46.576404 ignition[854]: INFO : no configs at "/usr/lib/ignition/base.d" May 15 10:21:46.576404 ignition[854]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:21:46.576404 ignition[854]: DEBUG : files: compiled without relabeling support, skipping May 15 10:21:46.579759 ignition[854]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 15 10:21:46.579759 ignition[854]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 15 10:21:46.582206 ignition[854]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 15 10:21:46.583216 ignition[854]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 15 10:21:46.583216 ignition[854]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 15 10:21:46.582897 unknown[854]: wrote ssh authorized keys file for user: core May 15 10:21:46.586047 ignition[854]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" May 15 10:21:46.586047 ignition[854]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" May 15 10:21:46.586047 ignition[854]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" May 15 10:21:46.586047 ignition[854]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 15 10:21:46.586047 ignition[854]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" May 15 10:21:46.586047 ignition[854]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" May 15 10:21:46.586047 ignition[854]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" May 15 10:21:46.586047 ignition[854]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-arm64.raw: attempt #1 May 15 10:21:46.937628 ignition[854]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK May 15 10:21:47.210586 ignition[854]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" May 15 10:21:47.210586 ignition[854]: INFO : files: op(7): [started] processing unit "coreos-metadata.service" May 15 10:21:47.213508 ignition[854]: INFO : files: op(7): op(8): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 15 10:21:47.213508 ignition[854]: INFO : files: op(7): op(8): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 15 10:21:47.213508 ignition[854]: INFO : files: op(7): [finished] processing unit "coreos-metadata.service" May 15 10:21:47.213508 ignition[854]: INFO : files: op(9): [started] setting preset to disabled for "coreos-metadata.service" May 15 10:21:47.213508 ignition[854]: INFO : files: op(9): op(a): [started] removing enablement symlink(s) for "coreos-metadata.service" May 15 10:21:47.245103 ignition[854]: INFO : files: op(9): op(a): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 15 10:21:47.246222 ignition[854]: INFO : files: op(9): [finished] setting preset to disabled for "coreos-metadata.service" May 15 10:21:47.247438 ignition[854]: INFO : files: createResultFile: createFiles: op(b): [started] writing file "/sysroot/etc/.ignition-result.json" May 15 10:21:47.248726 ignition[854]: INFO : files: createResultFile: createFiles: op(b): [finished] writing file "/sysroot/etc/.ignition-result.json" May 15 10:21:47.248726 ignition[854]: INFO : files: files passed May 15 10:21:47.248726 ignition[854]: INFO : Ignition finished successfully May 15 10:21:47.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:47.248539 systemd[1]: Finished ignition-files.service. May 15 10:21:47.250142 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 15 10:21:47.251253 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 15 10:21:47.251867 systemd[1]: Starting ignition-quench.service... May 15 10:21:47.256205 initrd-setup-root-after-ignition[879]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory May 15 10:21:47.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:47.256000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:47.254620 systemd[1]: ignition-quench.service: Deactivated successfully. May 15 10:21:47.254703 systemd[1]: Finished ignition-quench.service. May 15 10:21:47.258939 initrd-setup-root-after-ignition[881]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 15 10:21:47.259000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:47.258489 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 15 10:21:47.259715 systemd[1]: Reached target ignition-complete.target. May 15 10:21:47.261720 systemd[1]: Starting initrd-parse-etc.service... May 15 10:21:47.273311 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 15 10:21:47.273400 systemd[1]: Finished initrd-parse-etc.service. May 15 10:21:47.274000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:47.274000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:47.274882 systemd[1]: Reached target initrd-fs.target. May 15 10:21:47.275771 systemd[1]: Reached target initrd.target. May 15 10:21:47.276357 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 15 10:21:47.277007 systemd[1]: Starting dracut-pre-pivot.service... May 15 10:21:47.286557 systemd[1]: Finished dracut-pre-pivot.service. May 15 10:21:47.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:47.288001 systemd[1]: Starting initrd-cleanup.service... May 15 10:21:47.295363 systemd[1]: Stopped target nss-lookup.target. May 15 10:21:47.296187 systemd[1]: Stopped target remote-cryptsetup.target. May 15 10:21:47.297617 systemd[1]: Stopped target timers.target. May 15 10:21:47.298981 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 15 10:21:47.300000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:47.299103 systemd[1]: Stopped dracut-pre-pivot.service. May 15 10:21:47.300356 systemd[1]: Stopped target initrd.target. May 15 10:21:47.301735 systemd[1]: Stopped target basic.target. May 15 10:21:47.302980 systemd[1]: Stopped target ignition-complete.target. May 15 10:21:47.304332 systemd[1]: Stopped target ignition-diskful.target. May 15 10:21:47.305648 systemd[1]: Stopped target initrd-root-device.target. May 15 10:21:47.307101 systemd[1]: Stopped target remote-fs.target. May 15 10:21:47.308449 systemd[1]: Stopped target remote-fs-pre.target. May 15 10:21:47.309890 systemd[1]: Stopped target sysinit.target. May 15 10:21:47.311159 systemd[1]: Stopped target local-fs.target. May 15 10:21:47.312481 systemd[1]: Stopped target local-fs-pre.target. May 15 10:21:47.313778 systemd[1]: Stopped target swap.target. May 15 10:21:47.316000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:47.314973 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 15 10:21:47.315099 systemd[1]: Stopped dracut-pre-mount.service. May 15 10:21:47.318000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:47.316426 systemd[1]: Stopped target cryptsetup.target. May 15 10:21:47.320000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:47.317588 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 15 10:21:47.317690 systemd[1]: Stopped dracut-initqueue.service. May 15 10:21:47.319153 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 15 10:21:47.319249 systemd[1]: Stopped ignition-fetch-offline.service. May 15 10:21:47.320543 systemd[1]: Stopped target paths.target. May 15 10:21:47.321705 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 15 10:21:47.328000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:47.323123 systemd[1]: Stopped systemd-ask-password-console.path. May 15 10:21:47.329000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:47.324044 systemd[1]: Stopped target slices.target. May 15 10:21:47.325561 systemd[1]: Stopped target sockets.target. May 15 10:21:47.332575 iscsid[745]: iscsid shutting down. May 15 10:21:47.326879 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 15 10:21:47.334000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:47.326989 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 15 10:21:47.328354 systemd[1]: ignition-files.service: Deactivated successfully. May 15 10:21:47.337000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:47.328445 systemd[1]: Stopped ignition-files.service. May 15 10:21:47.338000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:47.330735 systemd[1]: Stopping ignition-mount.service... May 15 10:21:47.340626 ignition[894]: INFO : Ignition 2.14.0 May 15 10:21:47.340626 ignition[894]: INFO : Stage: umount May 15 10:21:47.340626 ignition[894]: INFO : no configs at "/usr/lib/ignition/base.d" May 15 10:21:47.340626 ignition[894]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:21:47.340626 ignition[894]: INFO : umount: umount passed May 15 10:21:47.340626 ignition[894]: INFO : Ignition finished successfully May 15 10:21:47.341000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:47.342000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:47.345000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:47.347000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:47.349000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:47.332086 systemd[1]: Stopping iscsid.service... May 15 10:21:47.333034 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 15 10:21:47.333178 systemd[1]: Stopped kmod-static-nodes.service. May 15 10:21:47.353000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:47.353000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:47.335256 systemd[1]: Stopping sysroot-boot.service... May 15 10:21:47.355000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:47.335932 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 15 10:21:47.336066 systemd[1]: Stopped systemd-udev-trigger.service. May 15 10:21:47.337693 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 15 10:21:47.337782 systemd[1]: Stopped dracut-pre-trigger.service. May 15 10:21:47.340644 systemd[1]: iscsid.service: Deactivated successfully. May 15 10:21:47.340732 systemd[1]: Stopped iscsid.service. May 15 10:21:47.341834 systemd[1]: ignition-mount.service: Deactivated successfully. May 15 10:21:47.341902 systemd[1]: Stopped ignition-mount.service. May 15 10:21:47.343286 systemd[1]: iscsid.socket: Deactivated successfully. May 15 10:21:47.343353 systemd[1]: Closed iscsid.socket. May 15 10:21:47.344140 systemd[1]: ignition-disks.service: Deactivated successfully. May 15 10:21:47.344179 systemd[1]: Stopped ignition-disks.service. May 15 10:21:47.345985 systemd[1]: ignition-kargs.service: Deactivated successfully. May 15 10:21:47.346028 systemd[1]: Stopped ignition-kargs.service. May 15 10:21:47.347888 systemd[1]: ignition-setup.service: Deactivated successfully. May 15 10:21:47.347929 systemd[1]: Stopped ignition-setup.service. May 15 10:21:47.349311 systemd[1]: Stopping iscsiuio.service... May 15 10:21:47.352528 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 15 10:21:47.352956 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 15 10:21:47.371000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:47.372000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:47.376000 audit: BPF prog-id=6 op=UNLOAD May 15 10:21:47.353040 systemd[1]: Finished initrd-cleanup.service. May 15 10:21:47.354256 systemd[1]: iscsiuio.service: Deactivated successfully. May 15 10:21:47.378000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:47.379000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:47.354337 systemd[1]: Stopped iscsiuio.service. May 15 10:21:47.381000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:47.356303 systemd[1]: Stopped target network.target. May 15 10:21:47.357087 systemd[1]: iscsiuio.socket: Deactivated successfully. May 15 10:21:47.357137 systemd[1]: Closed iscsiuio.socket. May 15 10:21:47.358949 systemd[1]: Stopping systemd-networkd.service... May 15 10:21:47.360232 systemd[1]: Stopping systemd-resolved.service... May 15 10:21:47.387000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:47.368171 systemd-networkd[738]: eth0: DHCPv6 lease lost May 15 10:21:47.370184 systemd[1]: systemd-resolved.service: Deactivated successfully. May 15 10:21:47.389000 audit: BPF prog-id=9 op=UNLOAD May 15 10:21:47.389000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:47.370273 systemd[1]: Stopped systemd-resolved.service. May 15 10:21:47.371877 systemd[1]: systemd-networkd.service: Deactivated successfully. May 15 10:21:47.393000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:47.371967 systemd[1]: Stopped systemd-networkd.service. May 15 10:21:47.394000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:47.373296 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 15 10:21:47.396000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:47.373324 systemd[1]: Closed systemd-networkd.socket. May 15 10:21:47.397000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:47.375130 systemd[1]: Stopping network-cleanup.service... May 15 10:21:47.376844 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 15 10:21:47.376897 systemd[1]: Stopped parse-ip-for-networkd.service. May 15 10:21:47.401000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:47.378680 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 15 10:21:47.403000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:47.378721 systemd[1]: Stopped systemd-sysctl.service. May 15 10:21:47.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:47.404000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:47.380786 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 15 10:21:47.380822 systemd[1]: Stopped systemd-modules-load.service. May 15 10:21:47.381814 systemd[1]: Stopping systemd-udevd.service... May 15 10:21:47.385835 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 15 10:21:47.386465 systemd[1]: sysroot-boot.service: Deactivated successfully. May 15 10:21:47.386538 systemd[1]: Stopped sysroot-boot.service. May 15 10:21:47.388592 systemd[1]: systemd-udevd.service: Deactivated successfully. May 15 10:21:47.388740 systemd[1]: Stopped systemd-udevd.service. May 15 10:21:47.389885 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 15 10:21:47.389920 systemd[1]: Closed systemd-udevd-control.socket. May 15 10:21:47.390992 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 15 10:21:47.391027 systemd[1]: Closed systemd-udevd-kernel.socket. May 15 10:21:47.391929 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 15 10:21:47.391973 systemd[1]: Stopped dracut-pre-udev.service. May 15 10:21:47.393349 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 15 10:21:47.393389 systemd[1]: Stopped dracut-cmdline.service. May 15 10:21:47.394876 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 15 10:21:47.394916 systemd[1]: Stopped dracut-cmdline-ask.service. May 15 10:21:47.396392 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 15 10:21:47.396434 systemd[1]: Stopped initrd-setup-root.service. May 15 10:21:47.398616 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 15 10:21:47.400114 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 15 10:21:47.400176 systemd[1]: Stopped systemd-vconsole-setup.service. May 15 10:21:47.402343 systemd[1]: network-cleanup.service: Deactivated successfully. May 15 10:21:47.402432 systemd[1]: Stopped network-cleanup.service. May 15 10:21:47.403920 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 15 10:21:47.431069 systemd-journald[289]: Received SIGTERM from PID 1 (n/a). May 15 10:21:47.403999 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 15 10:21:47.405142 systemd[1]: Reached target initrd-switch-root.target. May 15 10:21:47.407143 systemd[1]: Starting initrd-switch-root.service... May 15 10:21:47.413582 systemd[1]: Switching root. May 15 10:21:47.434160 systemd-journald[289]: Journal stopped May 15 10:21:49.477728 kernel: SELinux: Class mctp_socket not defined in policy. May 15 10:21:49.477784 kernel: SELinux: Class anon_inode not defined in policy. May 15 10:21:49.477796 kernel: SELinux: the above unknown classes and permissions will be allowed May 15 10:21:49.477809 kernel: SELinux: policy capability network_peer_controls=1 May 15 10:21:49.477819 kernel: SELinux: policy capability open_perms=1 May 15 10:21:49.477828 kernel: SELinux: policy capability extended_socket_class=1 May 15 10:21:49.477838 kernel: SELinux: policy capability always_check_network=0 May 15 10:21:49.477848 kernel: SELinux: policy capability cgroup_seclabel=1 May 15 10:21:49.477861 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 15 10:21:49.477871 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 15 10:21:49.477880 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 15 10:21:49.477891 systemd[1]: Successfully loaded SELinux policy in 31.787ms. May 15 10:21:49.477916 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 7.140ms. May 15 10:21:49.477933 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 15 10:21:49.477945 systemd[1]: Detected virtualization kvm. May 15 10:21:49.477956 systemd[1]: Detected architecture arm64. May 15 10:21:49.477966 systemd[1]: Detected first boot. May 15 10:21:49.477977 systemd[1]: Initializing machine ID from VM UUID. May 15 10:21:49.477988 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 15 10:21:49.478000 systemd[1]: Populated /etc with preset unit settings. May 15 10:21:49.478011 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 10:21:49.478023 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 10:21:49.478042 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 10:21:49.478056 kernel: kauditd_printk_skb: 79 callbacks suppressed May 15 10:21:49.478067 kernel: audit: type=1334 audit(1747304509.282:83): prog-id=12 op=LOAD May 15 10:21:49.478077 kernel: audit: type=1334 audit(1747304509.282:84): prog-id=3 op=UNLOAD May 15 10:21:49.478086 kernel: audit: type=1334 audit(1747304509.282:85): prog-id=13 op=LOAD May 15 10:21:49.478116 kernel: audit: type=1334 audit(1747304509.283:86): prog-id=14 op=LOAD May 15 10:21:49.478129 kernel: audit: type=1334 audit(1747304509.283:87): prog-id=4 op=UNLOAD May 15 10:21:49.478139 kernel: audit: type=1334 audit(1747304509.283:88): prog-id=5 op=UNLOAD May 15 10:21:49.478149 kernel: audit: type=1334 audit(1747304509.284:89): prog-id=15 op=LOAD May 15 10:21:49.478159 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 15 10:21:49.478169 kernel: audit: type=1334 audit(1747304509.284:90): prog-id=12 op=UNLOAD May 15 10:21:49.478180 systemd[1]: Stopped initrd-switch-root.service. May 15 10:21:49.478190 kernel: audit: type=1334 audit(1747304509.285:91): prog-id=16 op=LOAD May 15 10:21:49.478201 kernel: audit: type=1334 audit(1747304509.285:92): prog-id=17 op=LOAD May 15 10:21:49.478212 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 15 10:21:49.478225 systemd[1]: Created slice system-addon\x2dconfig.slice. May 15 10:21:49.478236 systemd[1]: Created slice system-addon\x2drun.slice. May 15 10:21:49.478246 systemd[1]: Created slice system-getty.slice. May 15 10:21:49.478257 systemd[1]: Created slice system-modprobe.slice. May 15 10:21:49.478267 systemd[1]: Created slice system-serial\x2dgetty.slice. May 15 10:21:49.478282 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 15 10:21:49.478293 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 15 10:21:49.478304 systemd[1]: Created slice user.slice. May 15 10:21:49.478316 systemd[1]: Started systemd-ask-password-console.path. May 15 10:21:49.478326 systemd[1]: Started systemd-ask-password-wall.path. May 15 10:21:49.478337 systemd[1]: Set up automount boot.automount. May 15 10:21:49.478347 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 15 10:21:49.478358 systemd[1]: Stopped target initrd-switch-root.target. May 15 10:21:49.478368 systemd[1]: Stopped target initrd-fs.target. May 15 10:21:49.478379 systemd[1]: Stopped target initrd-root-fs.target. May 15 10:21:49.478391 systemd[1]: Reached target integritysetup.target. May 15 10:21:49.478402 systemd[1]: Reached target remote-cryptsetup.target. May 15 10:21:49.478413 systemd[1]: Reached target remote-fs.target. May 15 10:21:49.478424 systemd[1]: Reached target slices.target. May 15 10:21:49.478434 systemd[1]: Reached target swap.target. May 15 10:21:49.478445 systemd[1]: Reached target torcx.target. May 15 10:21:49.478455 systemd[1]: Reached target veritysetup.target. May 15 10:21:49.478466 systemd[1]: Listening on systemd-coredump.socket. May 15 10:21:49.478478 systemd[1]: Listening on systemd-initctl.socket. May 15 10:21:49.478488 systemd[1]: Listening on systemd-networkd.socket. May 15 10:21:49.478499 systemd[1]: Listening on systemd-udevd-control.socket. May 15 10:21:49.478510 systemd[1]: Listening on systemd-udevd-kernel.socket. May 15 10:21:49.478520 systemd[1]: Listening on systemd-userdbd.socket. May 15 10:21:49.478535 systemd[1]: Mounting dev-hugepages.mount... May 15 10:21:49.478545 systemd[1]: Mounting dev-mqueue.mount... May 15 10:21:49.478556 systemd[1]: Mounting media.mount... May 15 10:21:49.478566 systemd[1]: Mounting sys-kernel-debug.mount... May 15 10:21:49.478578 systemd[1]: Mounting sys-kernel-tracing.mount... May 15 10:21:49.478588 systemd[1]: Mounting tmp.mount... May 15 10:21:49.478599 systemd[1]: Starting flatcar-tmpfiles.service... May 15 10:21:49.478609 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 10:21:49.478620 systemd[1]: Starting kmod-static-nodes.service... May 15 10:21:49.478631 systemd[1]: Starting modprobe@configfs.service... May 15 10:21:49.478641 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:21:49.478652 systemd[1]: Starting modprobe@drm.service... May 15 10:21:49.478663 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:21:49.478675 systemd[1]: Starting modprobe@fuse.service... May 15 10:21:49.478685 systemd[1]: Starting modprobe@loop.service... May 15 10:21:49.478696 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 15 10:21:49.478707 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 15 10:21:49.478717 systemd[1]: Stopped systemd-fsck-root.service. May 15 10:21:49.478728 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 15 10:21:49.478739 systemd[1]: Stopped systemd-fsck-usr.service. May 15 10:21:49.478749 systemd[1]: Stopped systemd-journald.service. May 15 10:21:49.478759 systemd[1]: Starting systemd-journald.service... May 15 10:21:49.478771 systemd[1]: Starting systemd-modules-load.service... May 15 10:21:49.478782 systemd[1]: Starting systemd-network-generator.service... May 15 10:21:49.478792 systemd[1]: Starting systemd-remount-fs.service... May 15 10:21:49.478803 systemd[1]: Starting systemd-udev-trigger.service... May 15 10:21:49.478813 systemd[1]: verity-setup.service: Deactivated successfully. May 15 10:21:49.478824 systemd[1]: Stopped verity-setup.service. May 15 10:21:49.478834 systemd[1]: Mounted dev-hugepages.mount. May 15 10:21:49.478845 systemd[1]: Mounted dev-mqueue.mount. May 15 10:21:49.478855 systemd[1]: Mounted media.mount. May 15 10:21:49.478867 kernel: loop: module loaded May 15 10:21:49.478877 systemd[1]: Mounted sys-kernel-debug.mount. May 15 10:21:49.478888 systemd[1]: Mounted sys-kernel-tracing.mount. May 15 10:21:49.478898 systemd[1]: Mounted tmp.mount. May 15 10:21:49.478908 systemd[1]: Finished kmod-static-nodes.service. May 15 10:21:49.478919 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 15 10:21:49.478930 systemd[1]: Finished modprobe@configfs.service. May 15 10:21:49.478940 kernel: fuse: init (API version 7.34) May 15 10:21:49.478950 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:21:49.478961 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:21:49.478973 systemd[1]: modprobe@drm.service: Deactivated successfully. May 15 10:21:49.478985 systemd[1]: Finished modprobe@drm.service. May 15 10:21:49.478995 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:21:49.479006 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:21:49.479018 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 15 10:21:49.479033 systemd[1]: Finished modprobe@fuse.service. May 15 10:21:49.479048 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:21:49.479059 systemd[1]: Finished modprobe@loop.service. May 15 10:21:49.479069 systemd[1]: Finished systemd-modules-load.service. May 15 10:21:49.479081 systemd[1]: Finished systemd-network-generator.service. May 15 10:21:49.479106 systemd[1]: Finished systemd-remount-fs.service. May 15 10:21:49.479120 systemd[1]: Reached target network-pre.target. May 15 10:21:49.479130 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 15 10:21:49.479145 systemd-journald[984]: Journal started May 15 10:21:49.479190 systemd-journald[984]: Runtime Journal (/run/log/journal/3a681d0e4c754306a5fd7c2a7a6e1994) is 6.0M, max 48.7M, 42.6M free. May 15 10:21:47.489000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 15 10:21:47.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 15 10:21:47.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 15 10:21:47.550000 audit: BPF prog-id=10 op=LOAD May 15 10:21:47.550000 audit: BPF prog-id=10 op=UNLOAD May 15 10:21:47.550000 audit: BPF prog-id=11 op=LOAD May 15 10:21:47.550000 audit: BPF prog-id=11 op=UNLOAD May 15 10:21:47.589000 audit[927]: AVC avc: denied { associate } for pid=927 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 15 10:21:47.589000 audit[927]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001058cc a1=4000028e40 a2=4000027080 a3=32 items=0 ppid=910 pid=927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:47.589000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 15 10:21:47.590000 audit[927]: AVC avc: denied { associate } for pid=927 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 15 10:21:47.590000 audit[927]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40001059a9 a2=1ed a3=0 items=2 ppid=910 pid=927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:47.590000 audit: CWD cwd="/" May 15 10:21:47.590000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:21:47.590000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:21:47.590000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 15 10:21:49.282000 audit: BPF prog-id=12 op=LOAD May 15 10:21:49.282000 audit: BPF prog-id=3 op=UNLOAD May 15 10:21:49.282000 audit: BPF prog-id=13 op=LOAD May 15 10:21:49.283000 audit: BPF prog-id=14 op=LOAD May 15 10:21:49.283000 audit: BPF prog-id=4 op=UNLOAD May 15 10:21:49.283000 audit: BPF prog-id=5 op=UNLOAD May 15 10:21:49.284000 audit: BPF prog-id=15 op=LOAD May 15 10:21:49.284000 audit: BPF prog-id=12 op=UNLOAD May 15 10:21:49.285000 audit: BPF prog-id=16 op=LOAD May 15 10:21:49.285000 audit: BPF prog-id=17 op=LOAD May 15 10:21:49.285000 audit: BPF prog-id=13 op=UNLOAD May 15 10:21:49.285000 audit: BPF prog-id=14 op=UNLOAD May 15 10:21:49.286000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:49.290000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:49.290000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:49.297000 audit: BPF prog-id=15 op=UNLOAD May 15 10:21:49.397000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:49.399000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:49.400000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:49.400000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:49.405000 audit: BPF prog-id=18 op=LOAD May 15 10:21:49.405000 audit: BPF prog-id=19 op=LOAD May 15 10:21:49.405000 audit: BPF prog-id=20 op=LOAD May 15 10:21:49.405000 audit: BPF prog-id=16 op=UNLOAD May 15 10:21:49.405000 audit: BPF prog-id=17 op=UNLOAD May 15 10:21:49.438000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:49.450000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:49.453000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:49.453000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:49.455000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:49.455000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:49.460000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:49.460000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:49.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:49.463000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:49.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:49.465000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:49.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:49.467000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:49.468000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 15 10:21:49.468000 audit[984]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=3 a1=fffff4d03fe0 a2=4000 a3=1 items=0 ppid=1 pid=984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:49.468000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 15 10:21:49.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:49.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:49.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:49.280847 systemd[1]: Queued start job for default target multi-user.target. May 15 10:21:47.587200 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-15T10:21:47Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 10:21:49.280862 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 15 10:21:47.587452 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-15T10:21:47Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 15 10:21:49.286266 systemd[1]: systemd-journald.service: Deactivated successfully. May 15 10:21:47.587471 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-15T10:21:47Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 15 10:21:47.587500 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-15T10:21:47Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 15 10:21:47.587510 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-15T10:21:47Z" level=debug msg="skipped missing lower profile" missing profile=oem May 15 10:21:47.587548 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-15T10:21:47Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 15 10:21:47.587560 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-15T10:21:47Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 15 10:21:47.587754 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-15T10:21:47Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 15 10:21:47.587793 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-15T10:21:47Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 15 10:21:47.587805 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-15T10:21:47Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 15 10:21:47.588901 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-15T10:21:47Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 15 10:21:49.485115 systemd[1]: Mounting sys-kernel-config.mount... May 15 10:21:47.588943 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-15T10:21:47Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 15 10:21:47.588962 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-15T10:21:47Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.100: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.100 May 15 10:21:47.588975 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-15T10:21:47Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 15 10:21:49.487852 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 15 10:21:47.588994 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-15T10:21:47Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.100: no such file or directory" path=/var/lib/torcx/store/3510.3.100 May 15 10:21:47.589007 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-15T10:21:47Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 15 10:21:49.025480 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-15T10:21:49Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 10:21:49.025781 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-15T10:21:49Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 10:21:49.025912 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-15T10:21:49Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 10:21:49.492367 systemd[1]: Starting systemd-hwdb-update.service... May 15 10:21:49.492403 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 10:21:49.492418 systemd[1]: Starting systemd-random-seed.service... May 15 10:21:49.026154 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-15T10:21:49Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 10:21:49.026216 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-15T10:21:49Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 15 10:21:49.026283 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-15T10:21:49Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 15 10:21:49.497108 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 10:21:49.499488 systemd[1]: Starting systemd-sysctl.service... May 15 10:21:49.502123 systemd[1]: Started systemd-journald.service. May 15 10:21:49.502000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:49.502831 systemd[1]: Finished systemd-udev-trigger.service. May 15 10:21:49.503000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:49.503645 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 15 10:21:49.504552 systemd[1]: Mounted sys-kernel-config.mount. May 15 10:21:49.505356 systemd[1]: Finished systemd-random-seed.service. May 15 10:21:49.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:49.506483 systemd[1]: Reached target first-boot-complete.target. May 15 10:21:49.508042 systemd[1]: Starting systemd-journal-flush.service... May 15 10:21:49.511000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:49.512000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:49.510111 systemd[1]: Starting systemd-udev-settle.service... May 15 10:21:49.511329 systemd[1]: Finished flatcar-tmpfiles.service. May 15 10:21:49.512219 systemd[1]: Finished systemd-sysctl.service. May 15 10:21:49.515320 systemd[1]: Starting systemd-sysusers.service... May 15 10:21:49.516143 systemd-journald[984]: Time spent on flushing to /var/log/journal/3a681d0e4c754306a5fd7c2a7a6e1994 is 13.383ms for 986 entries. May 15 10:21:49.516143 systemd-journald[984]: System Journal (/var/log/journal/3a681d0e4c754306a5fd7c2a7a6e1994) is 8.0M, max 195.6M, 187.6M free. May 15 10:21:49.536685 systemd-journald[984]: Received client request to flush runtime journal. May 15 10:21:49.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:49.532891 systemd[1]: Finished systemd-sysusers.service. May 15 10:21:49.537574 udevadm[1025]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. May 15 10:21:49.537633 systemd[1]: Finished systemd-journal-flush.service. May 15 10:21:49.538000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:49.864972 systemd[1]: Finished systemd-hwdb-update.service. May 15 10:21:49.865000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:49.866000 audit: BPF prog-id=21 op=LOAD May 15 10:21:49.866000 audit: BPF prog-id=22 op=LOAD May 15 10:21:49.866000 audit: BPF prog-id=7 op=UNLOAD May 15 10:21:49.866000 audit: BPF prog-id=8 op=UNLOAD May 15 10:21:49.867354 systemd[1]: Starting systemd-udevd.service... May 15 10:21:49.884267 systemd-udevd[1029]: Using default interface naming scheme 'v252'. May 15 10:21:49.895641 systemd[1]: Started systemd-udevd.service. May 15 10:21:49.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:49.897000 audit: BPF prog-id=23 op=LOAD May 15 10:21:49.897932 systemd[1]: Starting systemd-networkd.service... May 15 10:21:49.911000 audit: BPF prog-id=24 op=LOAD May 15 10:21:49.911000 audit: BPF prog-id=25 op=LOAD May 15 10:21:49.911000 audit: BPF prog-id=26 op=LOAD May 15 10:21:49.912160 systemd[1]: Starting systemd-userdbd.service... May 15 10:21:49.913855 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. May 15 10:21:49.958288 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 15 10:21:49.959312 systemd[1]: Started systemd-userdbd.service. May 15 10:21:49.959000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:49.994468 systemd[1]: Finished systemd-udev-settle.service. May 15 10:21:49.995000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:49.996523 systemd[1]: Starting lvm2-activation-early.service... May 15 10:21:50.006461 lvm[1062]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 15 10:21:50.010011 systemd-networkd[1037]: lo: Link UP May 15 10:21:50.010021 systemd-networkd[1037]: lo: Gained carrier May 15 10:21:50.010402 systemd-networkd[1037]: Enumeration completed May 15 10:21:50.010510 systemd-networkd[1037]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 15 10:21:50.010516 systemd[1]: Started systemd-networkd.service. May 15 10:21:50.011000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:50.012261 systemd-networkd[1037]: eth0: Link UP May 15 10:21:50.012271 systemd-networkd[1037]: eth0: Gained carrier May 15 10:21:50.030982 systemd[1]: Finished lvm2-activation-early.service. May 15 10:21:50.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:50.031993 systemd[1]: Reached target cryptsetup.target. May 15 10:21:50.033872 systemd[1]: Starting lvm2-activation.service... May 15 10:21:50.034198 systemd-networkd[1037]: eth0: DHCPv4 address 10.0.0.109/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 15 10:21:50.037018 lvm[1063]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 15 10:21:50.072820 systemd[1]: Finished lvm2-activation.service. May 15 10:21:50.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:50.073762 systemd[1]: Reached target local-fs-pre.target. May 15 10:21:50.074611 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 15 10:21:50.074641 systemd[1]: Reached target local-fs.target. May 15 10:21:50.075430 systemd[1]: Reached target machines.target. May 15 10:21:50.077250 systemd[1]: Starting ldconfig.service... May 15 10:21:50.078503 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:21:50.078563 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:21:50.079957 systemd[1]: Starting systemd-boot-update.service... May 15 10:21:50.082142 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 15 10:21:50.084193 systemd[1]: Starting systemd-machine-id-commit.service... May 15 10:21:50.087257 systemd[1]: Starting systemd-sysext.service... May 15 10:21:50.089497 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1065 (bootctl) May 15 10:21:50.090509 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 15 10:21:50.096792 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 15 10:21:50.097000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:50.104896 systemd[1]: Unmounting usr-share-oem.mount... May 15 10:21:50.109511 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 15 10:21:50.109724 systemd[1]: Unmounted usr-share-oem.mount. May 15 10:21:50.158111 kernel: loop0: detected capacity change from 0 to 194096 May 15 10:21:50.159930 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 15 10:21:50.161434 systemd[1]: Finished systemd-machine-id-commit.service. May 15 10:21:50.162000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:50.166110 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 15 10:21:50.179106 systemd-fsck[1073]: fsck.fat 4.2 (2021-01-31) May 15 10:21:50.179106 systemd-fsck[1073]: /dev/vda1: 236 files, 117182/258078 clusters May 15 10:21:50.181185 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 15 10:21:50.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:50.183720 systemd[1]: Mounting boot.mount... May 15 10:21:50.190112 kernel: loop1: detected capacity change from 0 to 194096 May 15 10:21:50.191087 systemd[1]: Mounted boot.mount. May 15 10:21:50.197950 (sd-sysext)[1079]: Using extensions 'kubernetes'. May 15 10:21:50.198810 (sd-sysext)[1079]: Merged extensions into '/usr'. May 15 10:21:50.200000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:50.199484 systemd[1]: Finished systemd-boot-update.service. May 15 10:21:50.211231 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 10:21:50.212565 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:21:50.214568 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:21:50.216552 systemd[1]: Starting modprobe@loop.service... May 15 10:21:50.217441 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:21:50.217572 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:21:50.218352 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:21:50.218475 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:21:50.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:50.219000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:50.219872 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:21:50.219986 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:21:50.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:50.221000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:50.221430 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:21:50.221534 systemd[1]: Finished modprobe@loop.service. May 15 10:21:50.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:50.222000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:50.222848 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 10:21:50.222946 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 10:21:50.260715 ldconfig[1064]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 15 10:21:50.264764 systemd[1]: Finished ldconfig.service. May 15 10:21:50.265000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:50.442299 systemd[1]: Mounting usr-share-oem.mount... May 15 10:21:50.447338 systemd[1]: Mounted usr-share-oem.mount. May 15 10:21:50.449162 systemd[1]: Finished systemd-sysext.service. May 15 10:21:50.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:50.451130 systemd[1]: Starting ensure-sysext.service... May 15 10:21:50.452777 systemd[1]: Starting systemd-tmpfiles-setup.service... May 15 10:21:50.457107 systemd[1]: Reloading. May 15 10:21:50.463917 systemd-tmpfiles[1086]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 15 10:21:50.466152 systemd-tmpfiles[1086]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 15 10:21:50.469051 systemd-tmpfiles[1086]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 15 10:21:50.502953 /usr/lib/systemd/system-generators/torcx-generator[1106]: time="2025-05-15T10:21:50Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 10:21:50.503338 /usr/lib/systemd/system-generators/torcx-generator[1106]: time="2025-05-15T10:21:50Z" level=info msg="torcx already run" May 15 10:21:50.558284 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 10:21:50.558308 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 10:21:50.573568 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 10:21:50.617000 audit: BPF prog-id=27 op=LOAD May 15 10:21:50.617000 audit: BPF prog-id=18 op=UNLOAD May 15 10:21:50.617000 audit: BPF prog-id=28 op=LOAD May 15 10:21:50.617000 audit: BPF prog-id=29 op=LOAD May 15 10:21:50.617000 audit: BPF prog-id=19 op=UNLOAD May 15 10:21:50.617000 audit: BPF prog-id=20 op=UNLOAD May 15 10:21:50.618000 audit: BPF prog-id=30 op=LOAD May 15 10:21:50.618000 audit: BPF prog-id=24 op=UNLOAD May 15 10:21:50.618000 audit: BPF prog-id=31 op=LOAD May 15 10:21:50.618000 audit: BPF prog-id=32 op=LOAD May 15 10:21:50.618000 audit: BPF prog-id=25 op=UNLOAD May 15 10:21:50.618000 audit: BPF prog-id=26 op=UNLOAD May 15 10:21:50.619000 audit: BPF prog-id=33 op=LOAD May 15 10:21:50.619000 audit: BPF prog-id=23 op=UNLOAD May 15 10:21:50.620000 audit: BPF prog-id=34 op=LOAD May 15 10:21:50.620000 audit: BPF prog-id=35 op=LOAD May 15 10:21:50.620000 audit: BPF prog-id=21 op=UNLOAD May 15 10:21:50.620000 audit: BPF prog-id=22 op=UNLOAD May 15 10:21:50.621777 systemd[1]: Finished systemd-tmpfiles-setup.service. May 15 10:21:50.622000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:50.625942 systemd[1]: Starting audit-rules.service... May 15 10:21:50.627873 systemd[1]: Starting clean-ca-certificates.service... May 15 10:21:50.631392 systemd[1]: Starting systemd-journal-catalog-update.service... May 15 10:21:50.633000 audit: BPF prog-id=36 op=LOAD May 15 10:21:50.634838 systemd[1]: Starting systemd-resolved.service... May 15 10:21:50.636000 audit: BPF prog-id=37 op=LOAD May 15 10:21:50.636977 systemd[1]: Starting systemd-timesyncd.service... May 15 10:21:50.638777 systemd[1]: Starting systemd-update-utmp.service... May 15 10:21:50.640157 systemd[1]: Finished clean-ca-certificates.service. May 15 10:21:50.640000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:50.642997 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 10:21:50.647000 audit[1156]: SYSTEM_BOOT pid=1156 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 15 10:21:50.650453 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 10:21:50.651718 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:21:50.653883 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:21:50.656121 systemd[1]: Starting modprobe@loop.service... May 15 10:21:50.657060 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:21:50.657198 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:21:50.657299 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 10:21:50.658372 systemd[1]: Finished systemd-journal-catalog-update.service. May 15 10:21:50.659000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:50.659810 systemd[1]: Finished systemd-update-utmp.service. May 15 10:21:50.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:50.661041 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:21:50.661162 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:21:50.661000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:50.661000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:50.662351 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:21:50.662458 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:21:50.663000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:50.663000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:50.663752 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:21:50.663856 systemd[1]: Finished modprobe@loop.service. May 15 10:21:50.664000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:50.664000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:50.666624 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 10:21:50.667700 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:21:50.669723 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:21:50.671574 systemd[1]: Starting modprobe@loop.service... May 15 10:21:50.672428 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:21:50.672548 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:21:50.673722 systemd[1]: Starting systemd-update-done.service... May 15 10:21:50.674611 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 10:21:50.675500 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:21:50.675622 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:21:50.676000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:50.676000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:50.676810 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:21:50.676916 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:21:50.677000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:50.677000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:50.677943 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:21:50.678059 systemd[1]: Finished modprobe@loop.service. May 15 10:21:50.678000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:50.678000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:50.679288 systemd[1]: Finished systemd-update-done.service. May 15 10:21:50.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:50.680364 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 10:21:50.680459 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 10:21:50.682664 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 10:21:50.683737 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:21:50.685605 systemd[1]: Starting modprobe@drm.service... May 15 10:21:50.687681 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:21:50.689583 systemd[1]: Starting modprobe@loop.service... May 15 10:21:50.690449 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:21:50.690571 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:21:50.691734 systemd[1]: Starting systemd-networkd-wait-online.service... May 15 10:21:50.692819 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 10:21:50.694007 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:21:50.694192 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:21:50.694270 systemd-resolved[1149]: Positive Trust Anchors: May 15 10:21:50.694283 systemd-resolved[1149]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 15 10:21:50.694310 systemd-resolved[1149]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 15 10:21:50.695000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:50.695000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:50.695497 systemd[1]: modprobe@drm.service: Deactivated successfully. May 15 10:21:50.695604 systemd[1]: Finished modprobe@drm.service. May 15 10:21:50.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:50.696000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:50.696851 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:21:50.696957 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:21:50.698000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:50.698000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:50.698821 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:21:50.698936 systemd[1]: Finished modprobe@loop.service. May 15 10:21:50.699163 augenrules[1172]: No rules May 15 10:21:50.698000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 15 10:21:50.698000 audit[1172]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc1647b30 a2=420 a3=0 items=0 ppid=1145 pid=1172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:50.698000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 15 10:21:50.700462 systemd[1]: Finished audit-rules.service. May 15 10:21:50.701770 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 10:21:50.701844 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 10:21:50.702977 systemd[1]: Finished ensure-sysext.service. May 15 10:21:50.708766 systemd-resolved[1149]: Defaulting to hostname 'linux'. May 15 10:21:50.710176 systemd[1]: Started systemd-resolved.service. May 15 10:21:50.711035 systemd[1]: Reached target network.target. May 15 10:21:50.712006 systemd[1]: Reached target nss-lookup.target. May 15 10:21:50.713501 systemd[1]: Started systemd-timesyncd.service. May 15 10:21:50.714385 systemd-timesyncd[1154]: Contacted time server 10.0.0.1:123 (10.0.0.1). May 15 10:21:50.714596 systemd[1]: Reached target sysinit.target. May 15 10:21:50.714737 systemd-timesyncd[1154]: Initial clock synchronization to Thu 2025-05-15 10:21:50.359828 UTC. May 15 10:21:50.715472 systemd[1]: Started motdgen.path. May 15 10:21:50.716197 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 15 10:21:50.717241 systemd[1]: Started systemd-tmpfiles-clean.timer. May 15 10:21:50.718038 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 15 10:21:50.718067 systemd[1]: Reached target paths.target. May 15 10:21:50.718791 systemd[1]: Reached target time-set.target. May 15 10:21:50.719784 systemd[1]: Started logrotate.timer. May 15 10:21:50.720594 systemd[1]: Started mdadm.timer. May 15 10:21:50.721263 systemd[1]: Reached target timers.target. May 15 10:21:50.722302 systemd[1]: Listening on dbus.socket. May 15 10:21:50.723928 systemd[1]: Starting docker.socket... May 15 10:21:50.727295 systemd[1]: Listening on sshd.socket. May 15 10:21:50.728127 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:21:50.728562 systemd[1]: Listening on docker.socket. May 15 10:21:50.729391 systemd[1]: Reached target sockets.target. May 15 10:21:50.730156 systemd[1]: Reached target basic.target. May 15 10:21:50.730898 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 15 10:21:50.730932 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 15 10:21:50.731883 systemd[1]: Starting containerd.service... May 15 10:21:50.733598 systemd[1]: Starting dbus.service... May 15 10:21:50.735193 systemd[1]: Starting enable-oem-cloudinit.service... May 15 10:21:50.737129 systemd[1]: Starting extend-filesystems.service... May 15 10:21:50.737994 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 15 10:21:50.739318 systemd[1]: Starting motdgen.service... May 15 10:21:50.741216 systemd[1]: Starting ssh-key-proc-cmdline.service... May 15 10:21:50.742998 systemd[1]: Starting sshd-keygen.service... May 15 10:21:50.748410 systemd[1]: Starting systemd-logind.service... May 15 10:21:50.749010 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:21:50.749125 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 15 10:21:50.749597 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 15 10:21:50.750346 systemd[1]: Starting update-engine.service... May 15 10:21:50.751926 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 15 10:21:50.754163 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 15 10:21:50.756848 jq[1202]: true May 15 10:21:50.754337 systemd[1]: Finished ssh-key-proc-cmdline.service. May 15 10:21:50.761193 jq[1187]: false May 15 10:21:50.764607 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 15 10:21:50.764767 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 15 10:21:50.766319 systemd[1]: motdgen.service: Deactivated successfully. May 15 10:21:50.766469 systemd[1]: Finished motdgen.service. May 15 10:21:50.775038 dbus-daemon[1186]: [system] SELinux support is enabled May 15 10:21:50.775239 systemd[1]: Started dbus.service. May 15 10:21:50.777229 jq[1208]: true May 15 10:21:50.778798 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 15 10:21:50.778838 systemd[1]: Reached target system-config.target. May 15 10:21:50.779559 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 15 10:21:50.779584 systemd[1]: Reached target user-config.target. May 15 10:21:50.782818 extend-filesystems[1188]: Found loop1 May 15 10:21:50.782818 extend-filesystems[1188]: Found vda May 15 10:21:50.782818 extend-filesystems[1188]: Found vda1 May 15 10:21:50.782818 extend-filesystems[1188]: Found vda2 May 15 10:21:50.782818 extend-filesystems[1188]: Found vda3 May 15 10:21:50.782818 extend-filesystems[1188]: Found usr May 15 10:21:50.782818 extend-filesystems[1188]: Found vda4 May 15 10:21:50.782818 extend-filesystems[1188]: Found vda6 May 15 10:21:50.782818 extend-filesystems[1188]: Found vda7 May 15 10:21:50.782818 extend-filesystems[1188]: Found vda9 May 15 10:21:50.782818 extend-filesystems[1188]: Checking size of /dev/vda9 May 15 10:21:50.793356 extend-filesystems[1188]: Resized partition /dev/vda9 May 15 10:21:50.802377 extend-filesystems[1224]: resize2fs 1.46.5 (30-Dec-2021) May 15 10:21:50.817808 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks May 15 10:21:50.834496 systemd-logind[1197]: Watching system buttons on /dev/input/event0 (Power Button) May 15 10:21:50.834671 systemd-logind[1197]: New seat seat0. May 15 10:21:50.835886 systemd[1]: Started systemd-logind.service. May 15 10:21:50.841128 kernel: EXT4-fs (vda9): resized filesystem to 1864699 May 15 10:21:50.854237 update_engine[1199]: I0515 10:21:50.848624 1199 main.cc:92] Flatcar Update Engine starting May 15 10:21:50.854237 update_engine[1199]: I0515 10:21:50.853009 1199 update_check_scheduler.cc:74] Next update check in 11m38s May 15 10:21:50.854344 systemd[1]: Started update-engine.service. May 15 10:21:50.854706 extend-filesystems[1224]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 15 10:21:50.854706 extend-filesystems[1224]: old_desc_blocks = 1, new_desc_blocks = 1 May 15 10:21:50.854706 extend-filesystems[1224]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. May 15 10:21:50.858917 extend-filesystems[1188]: Resized filesystem in /dev/vda9 May 15 10:21:50.856947 systemd[1]: Started locksmithd.service. May 15 10:21:50.858881 systemd[1]: extend-filesystems.service: Deactivated successfully. May 15 10:21:50.859067 systemd[1]: Finished extend-filesystems.service. May 15 10:21:50.862658 bash[1234]: Updated "/home/core/.ssh/authorized_keys" May 15 10:21:50.863372 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 15 10:21:50.864149 env[1207]: time="2025-05-15T10:21:50.864085520Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 15 10:21:50.881969 env[1207]: time="2025-05-15T10:21:50.881931320Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 15 10:21:50.882200 env[1207]: time="2025-05-15T10:21:50.882180760Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 15 10:21:50.883422 env[1207]: time="2025-05-15T10:21:50.883392800Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.182-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 15 10:21:50.883506 env[1207]: time="2025-05-15T10:21:50.883490960Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 15 10:21:50.883757 env[1207]: time="2025-05-15T10:21:50.883734320Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 15 10:21:50.883854 env[1207]: time="2025-05-15T10:21:50.883838240Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 15 10:21:50.883914 env[1207]: time="2025-05-15T10:21:50.883897440Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 15 10:21:50.883965 env[1207]: time="2025-05-15T10:21:50.883952120Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 15 10:21:50.884122 env[1207]: time="2025-05-15T10:21:50.884087040Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 15 10:21:50.884500 env[1207]: time="2025-05-15T10:21:50.884478960Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 15 10:21:50.884704 env[1207]: time="2025-05-15T10:21:50.884682720Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 15 10:21:50.884771 env[1207]: time="2025-05-15T10:21:50.884757280Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 15 10:21:50.884879 env[1207]: time="2025-05-15T10:21:50.884862160Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 15 10:21:50.884952 env[1207]: time="2025-05-15T10:21:50.884937120Z" level=info msg="metadata content store policy set" policy=shared May 15 10:21:50.888133 env[1207]: time="2025-05-15T10:21:50.888109560Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 15 10:21:50.888229 env[1207]: time="2025-05-15T10:21:50.888214560Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 15 10:21:50.888288 env[1207]: time="2025-05-15T10:21:50.888275000Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 15 10:21:50.888381 env[1207]: time="2025-05-15T10:21:50.888364360Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 15 10:21:50.888451 env[1207]: time="2025-05-15T10:21:50.888430160Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 15 10:21:50.888543 env[1207]: time="2025-05-15T10:21:50.888528320Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 15 10:21:50.888602 env[1207]: time="2025-05-15T10:21:50.888589760Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 15 10:21:50.888972 env[1207]: time="2025-05-15T10:21:50.888944920Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 15 10:21:50.889100 env[1207]: time="2025-05-15T10:21:50.889069840Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 15 10:21:50.889183 env[1207]: time="2025-05-15T10:21:50.889169040Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 15 10:21:50.889243 env[1207]: time="2025-05-15T10:21:50.889230120Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 15 10:21:50.889303 env[1207]: time="2025-05-15T10:21:50.889289640Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 15 10:21:50.889454 env[1207]: time="2025-05-15T10:21:50.889436360Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 15 10:21:50.889596 env[1207]: time="2025-05-15T10:21:50.889579200Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 15 10:21:50.889861 env[1207]: time="2025-05-15T10:21:50.889841600Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 15 10:21:50.889960 env[1207]: time="2025-05-15T10:21:50.889944200Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 15 10:21:50.890033 env[1207]: time="2025-05-15T10:21:50.890007240Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 15 10:21:50.890273 env[1207]: time="2025-05-15T10:21:50.890256040Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 15 10:21:50.890348 env[1207]: time="2025-05-15T10:21:50.890323200Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 15 10:21:50.890407 env[1207]: time="2025-05-15T10:21:50.890394120Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 15 10:21:50.890483 env[1207]: time="2025-05-15T10:21:50.890469640Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 15 10:21:50.890555 env[1207]: time="2025-05-15T10:21:50.890540560Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 15 10:21:50.890614 env[1207]: time="2025-05-15T10:21:50.890601120Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 15 10:21:50.890672 env[1207]: time="2025-05-15T10:21:50.890658240Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 15 10:21:50.890729 env[1207]: time="2025-05-15T10:21:50.890716560Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 15 10:21:50.890804 env[1207]: time="2025-05-15T10:21:50.890789840Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 15 10:21:50.890987 env[1207]: time="2025-05-15T10:21:50.890967920Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 15 10:21:50.891083 env[1207]: time="2025-05-15T10:21:50.891067960Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 15 10:21:50.891174 env[1207]: time="2025-05-15T10:21:50.891160080Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 15 10:21:50.891232 env[1207]: time="2025-05-15T10:21:50.891218960Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 15 10:21:50.891296 env[1207]: time="2025-05-15T10:21:50.891280160Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 15 10:21:50.891368 env[1207]: time="2025-05-15T10:21:50.891353600Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 15 10:21:50.891437 env[1207]: time="2025-05-15T10:21:50.891421920Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 15 10:21:50.891523 env[1207]: time="2025-05-15T10:21:50.891509040Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 15 10:21:50.891797 env[1207]: time="2025-05-15T10:21:50.891746800Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 15 10:21:50.892502 env[1207]: time="2025-05-15T10:21:50.892184920Z" level=info msg="Connect containerd service" May 15 10:21:50.892502 env[1207]: time="2025-05-15T10:21:50.892236400Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 15 10:21:50.893384 env[1207]: time="2025-05-15T10:21:50.893356520Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 15 10:21:50.893711 env[1207]: time="2025-05-15T10:21:50.893661360Z" level=info msg="Start subscribing containerd event" May 15 10:21:50.893753 env[1207]: time="2025-05-15T10:21:50.893719280Z" level=info msg="Start recovering state" May 15 10:21:50.893802 env[1207]: time="2025-05-15T10:21:50.893785240Z" level=info msg="Start event monitor" May 15 10:21:50.893831 env[1207]: time="2025-05-15T10:21:50.893805640Z" level=info msg="Start snapshots syncer" May 15 10:21:50.893831 env[1207]: time="2025-05-15T10:21:50.893817680Z" level=info msg="Start cni network conf syncer for default" May 15 10:21:50.893831 env[1207]: time="2025-05-15T10:21:50.893825640Z" level=info msg="Start streaming server" May 15 10:21:50.894006 env[1207]: time="2025-05-15T10:21:50.893987040Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 15 10:21:50.894150 env[1207]: time="2025-05-15T10:21:50.894134000Z" level=info msg=serving... address=/run/containerd/containerd.sock May 15 10:21:50.894275 env[1207]: time="2025-05-15T10:21:50.894261480Z" level=info msg="containerd successfully booted in 0.032139s" May 15 10:21:50.894323 systemd[1]: Started containerd.service. May 15 10:21:50.900507 locksmithd[1237]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 15 10:21:51.355239 systemd-networkd[1037]: eth0: Gained IPv6LL May 15 10:21:51.356888 systemd[1]: Finished systemd-networkd-wait-online.service. May 15 10:21:51.357900 systemd[1]: Reached target network-online.target. May 15 10:21:51.360198 systemd[1]: Starting kubelet.service... May 15 10:21:51.846802 systemd[1]: Started kubelet.service. May 15 10:21:52.300189 kubelet[1251]: E0515 10:21:52.300074 1251 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 10:21:52.301967 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 10:21:52.302108 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 10:21:54.427536 sshd_keygen[1201]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 15 10:21:54.445857 systemd[1]: Finished sshd-keygen.service. May 15 10:21:54.447949 systemd[1]: Starting issuegen.service... May 15 10:21:54.452550 systemd[1]: issuegen.service: Deactivated successfully. May 15 10:21:54.452719 systemd[1]: Finished issuegen.service. May 15 10:21:54.454857 systemd[1]: Starting systemd-user-sessions.service... May 15 10:21:54.460815 systemd[1]: Finished systemd-user-sessions.service. May 15 10:21:54.463237 systemd[1]: Started getty@tty1.service. May 15 10:21:54.465360 systemd[1]: Started serial-getty@ttyAMA0.service. May 15 10:21:54.466429 systemd[1]: Reached target getty.target. May 15 10:21:54.467262 systemd[1]: Reached target multi-user.target. May 15 10:21:54.469529 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 15 10:21:54.476544 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 15 10:21:54.476731 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 15 10:21:54.477843 systemd[1]: Startup finished in 566ms (kernel) + 3.886s (initrd) + 7.022s (userspace) = 11.474s. May 15 10:21:56.347635 systemd[1]: Created slice system-sshd.slice. May 15 10:21:56.348801 systemd[1]: Started sshd@0-10.0.0.109:22-10.0.0.1:43032.service. May 15 10:21:56.394790 sshd[1274]: Accepted publickey for core from 10.0.0.1 port 43032 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:21:56.397101 sshd[1274]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:21:56.405016 systemd[1]: Created slice user-500.slice. May 15 10:21:56.406233 systemd[1]: Starting user-runtime-dir@500.service... May 15 10:21:56.407822 systemd-logind[1197]: New session 1 of user core. May 15 10:21:56.414522 systemd[1]: Finished user-runtime-dir@500.service. May 15 10:21:56.415874 systemd[1]: Starting user@500.service... May 15 10:21:56.418772 (systemd)[1277]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 15 10:21:56.478254 systemd[1277]: Queued start job for default target default.target. May 15 10:21:56.478744 systemd[1277]: Reached target paths.target. May 15 10:21:56.478776 systemd[1277]: Reached target sockets.target. May 15 10:21:56.478787 systemd[1277]: Reached target timers.target. May 15 10:21:56.478800 systemd[1277]: Reached target basic.target. May 15 10:21:56.478841 systemd[1277]: Reached target default.target. May 15 10:21:56.478867 systemd[1277]: Startup finished in 54ms. May 15 10:21:56.479050 systemd[1]: Started user@500.service. May 15 10:21:56.479993 systemd[1]: Started session-1.scope. May 15 10:21:56.530766 systemd[1]: Started sshd@1-10.0.0.109:22-10.0.0.1:43048.service. May 15 10:21:56.569224 sshd[1286]: Accepted publickey for core from 10.0.0.1 port 43048 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:21:56.570756 sshd[1286]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:21:56.576006 systemd[1]: Started session-2.scope. May 15 10:21:56.576273 systemd-logind[1197]: New session 2 of user core. May 15 10:21:56.630625 sshd[1286]: pam_unix(sshd:session): session closed for user core May 15 10:21:56.633412 systemd[1]: sshd@1-10.0.0.109:22-10.0.0.1:43048.service: Deactivated successfully. May 15 10:21:56.634160 systemd[1]: session-2.scope: Deactivated successfully. May 15 10:21:56.634689 systemd-logind[1197]: Session 2 logged out. Waiting for processes to exit. May 15 10:21:56.635766 systemd[1]: Started sshd@2-10.0.0.109:22-10.0.0.1:43050.service. May 15 10:21:56.636509 systemd-logind[1197]: Removed session 2. May 15 10:21:56.675300 sshd[1292]: Accepted publickey for core from 10.0.0.1 port 43050 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:21:56.676921 sshd[1292]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:21:56.680869 systemd-logind[1197]: New session 3 of user core. May 15 10:21:56.681749 systemd[1]: Started session-3.scope. May 15 10:21:56.731013 sshd[1292]: pam_unix(sshd:session): session closed for user core May 15 10:21:56.733350 systemd[1]: sshd@2-10.0.0.109:22-10.0.0.1:43050.service: Deactivated successfully. May 15 10:21:56.733981 systemd[1]: session-3.scope: Deactivated successfully. May 15 10:21:56.734545 systemd-logind[1197]: Session 3 logged out. Waiting for processes to exit. May 15 10:21:56.735563 systemd[1]: Started sshd@3-10.0.0.109:22-10.0.0.1:43064.service. May 15 10:21:56.736235 systemd-logind[1197]: Removed session 3. May 15 10:21:56.774331 sshd[1298]: Accepted publickey for core from 10.0.0.1 port 43064 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:21:56.775726 sshd[1298]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:21:56.779392 systemd-logind[1197]: New session 4 of user core. May 15 10:21:56.780280 systemd[1]: Started session-4.scope. May 15 10:21:56.833588 sshd[1298]: pam_unix(sshd:session): session closed for user core May 15 10:21:56.837099 systemd[1]: Started sshd@4-10.0.0.109:22-10.0.0.1:43080.service. May 15 10:21:56.837599 systemd[1]: sshd@3-10.0.0.109:22-10.0.0.1:43064.service: Deactivated successfully. May 15 10:21:56.838265 systemd[1]: session-4.scope: Deactivated successfully. May 15 10:21:56.838791 systemd-logind[1197]: Session 4 logged out. Waiting for processes to exit. May 15 10:21:56.839609 systemd-logind[1197]: Removed session 4. May 15 10:21:56.877540 sshd[1303]: Accepted publickey for core from 10.0.0.1 port 43080 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:21:56.878735 sshd[1303]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:21:56.881912 systemd-logind[1197]: New session 5 of user core. May 15 10:21:56.882911 systemd[1]: Started session-5.scope. May 15 10:21:56.944287 sudo[1307]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 15 10:21:56.944507 sudo[1307]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 10:21:56.962301 dbus-daemon[1186]: avc: received setenforce notice (enforcing=1) May 15 10:21:56.964034 sudo[1307]: pam_unix(sudo:session): session closed for user root May 15 10:21:56.966261 sshd[1303]: pam_unix(sshd:session): session closed for user core May 15 10:21:56.969947 systemd[1]: sshd@4-10.0.0.109:22-10.0.0.1:43080.service: Deactivated successfully. May 15 10:21:56.970669 systemd[1]: session-5.scope: Deactivated successfully. May 15 10:21:56.971188 systemd-logind[1197]: Session 5 logged out. Waiting for processes to exit. May 15 10:21:56.972282 systemd[1]: Started sshd@5-10.0.0.109:22-10.0.0.1:43094.service. May 15 10:21:56.972874 systemd-logind[1197]: Removed session 5. May 15 10:21:57.011659 sshd[1311]: Accepted publickey for core from 10.0.0.1 port 43094 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:21:57.013202 sshd[1311]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:21:57.017794 systemd[1]: Started session-6.scope. May 15 10:21:57.018081 systemd-logind[1197]: New session 6 of user core. May 15 10:21:57.069774 sudo[1316]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 15 10:21:57.070001 sudo[1316]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 10:21:57.072544 sudo[1316]: pam_unix(sudo:session): session closed for user root May 15 10:21:57.076757 sudo[1315]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 15 10:21:57.076967 sudo[1315]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 10:21:57.085165 systemd[1]: Stopping audit-rules.service... May 15 10:21:57.085000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 15 10:21:57.086472 auditctl[1319]: No rules May 15 10:21:57.086690 systemd[1]: audit-rules.service: Deactivated successfully. May 15 10:21:57.086845 systemd[1]: Stopped audit-rules.service. May 15 10:21:57.088095 kernel: kauditd_printk_skb: 116 callbacks suppressed May 15 10:21:57.088147 kernel: audit: type=1305 audit(1747304517.085:205): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 15 10:21:57.088165 kernel: audit: type=1300 audit(1747304517.085:205): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffffc992d10 a2=420 a3=0 items=0 ppid=1 pid=1319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:57.085000 audit[1319]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffffc992d10 a2=420 a3=0 items=0 ppid=1 pid=1319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:57.088243 systemd[1]: Starting audit-rules.service... May 15 10:21:57.085000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 15 10:21:57.091838 kernel: audit: type=1327 audit(1747304517.085:205): proctitle=2F7362696E2F617564697463746C002D44 May 15 10:21:57.091892 kernel: audit: type=1131 audit(1747304517.085:206): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:57.085000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:57.103764 augenrules[1336]: No rules May 15 10:21:57.104687 systemd[1]: Finished audit-rules.service. May 15 10:21:57.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:57.105756 sudo[1315]: pam_unix(sudo:session): session closed for user root May 15 10:21:57.104000 audit[1315]: USER_END pid=1315 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:21:57.109272 kernel: audit: type=1130 audit(1747304517.103:207): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:57.109387 kernel: audit: type=1106 audit(1747304517.104:208): pid=1315 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:21:57.109452 sshd[1311]: pam_unix(sshd:session): session closed for user core May 15 10:21:57.104000 audit[1315]: CRED_DISP pid=1315 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:21:57.111620 kernel: audit: type=1104 audit(1747304517.104:209): pid=1315 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:21:57.111679 kernel: audit: type=1130 audit(1747304517.110:210): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.109:22-10.0.0.1:43108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:57.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.109:22-10.0.0.1:43108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:57.111441 systemd[1]: Started sshd@6-10.0.0.109:22-10.0.0.1:43108.service. May 15 10:21:57.113000 audit[1311]: USER_END pid=1311 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:21:57.115812 systemd[1]: sshd@5-10.0.0.109:22-10.0.0.1:43094.service: Deactivated successfully. May 15 10:21:57.116616 systemd[1]: session-6.scope: Deactivated successfully. May 15 10:21:57.113000 audit[1311]: CRED_DISP pid=1311 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:21:57.118754 systemd-logind[1197]: Session 6 logged out. Waiting for processes to exit. May 15 10:21:57.119605 systemd-logind[1197]: Removed session 6. May 15 10:21:57.120109 kernel: audit: type=1106 audit(1747304517.113:211): pid=1311 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:21:57.120250 kernel: audit: type=1104 audit(1747304517.113:212): pid=1311 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:21:57.115000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.109:22-10.0.0.1:43094 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:57.148000 audit[1341]: USER_ACCT pid=1341 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:21:57.150851 sshd[1341]: Accepted publickey for core from 10.0.0.1 port 43108 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:21:57.150000 audit[1341]: CRED_ACQ pid=1341 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:21:57.150000 audit[1341]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffeb55d320 a2=3 a3=1 items=0 ppid=1 pid=1341 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:21:57.150000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:21:57.151636 sshd[1341]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:21:57.155837 systemd[1]: Started session-7.scope. May 15 10:21:57.156155 systemd-logind[1197]: New session 7 of user core. May 15 10:21:57.158000 audit[1341]: USER_START pid=1341 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:21:57.159000 audit[1344]: CRED_ACQ pid=1344 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:21:57.205000 audit[1345]: USER_ACCT pid=1345 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:21:57.206785 sudo[1345]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 15 10:21:57.205000 audit[1345]: CRED_REFR pid=1345 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:21:57.207001 sudo[1345]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 10:21:57.207000 audit[1345]: USER_START pid=1345 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:21:57.218231 systemd[1]: Starting coreos-metadata.service... May 15 10:21:57.224690 systemd[1]: coreos-metadata.service: Deactivated successfully. May 15 10:21:57.224854 systemd[1]: Finished coreos-metadata.service. May 15 10:21:57.224000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:57.224000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:57.727183 systemd[1]: Stopped kubelet.service. May 15 10:21:57.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:57.726000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:57.729291 systemd[1]: Starting kubelet.service... May 15 10:21:57.747119 systemd[1]: Reloading. May 15 10:21:57.801344 /usr/lib/systemd/system-generators/torcx-generator[1413]: time="2025-05-15T10:21:57Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 10:21:57.801373 /usr/lib/systemd/system-generators/torcx-generator[1413]: time="2025-05-15T10:21:57Z" level=info msg="torcx already run" May 15 10:21:57.946277 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 10:21:57.946296 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 10:21:57.961413 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 10:21:58.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.009000 audit: BPF prog-id=43 op=LOAD May 15 10:21:58.009000 audit: BPF prog-id=38 op=UNLOAD May 15 10:21:58.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.009000 audit: BPF prog-id=44 op=LOAD May 15 10:21:58.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.009000 audit: BPF prog-id=45 op=LOAD May 15 10:21:58.009000 audit: BPF prog-id=39 op=UNLOAD May 15 10:21:58.009000 audit: BPF prog-id=40 op=UNLOAD May 15 10:21:58.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.010000 audit: BPF prog-id=46 op=LOAD May 15 10:21:58.010000 audit: BPF prog-id=36 op=UNLOAD May 15 10:21:58.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.011000 audit: BPF prog-id=47 op=LOAD May 15 10:21:58.011000 audit: BPF prog-id=37 op=UNLOAD May 15 10:21:58.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.012000 audit: BPF prog-id=48 op=LOAD May 15 10:21:58.012000 audit: BPF prog-id=27 op=UNLOAD May 15 10:21:58.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.012000 audit: BPF prog-id=49 op=LOAD May 15 10:21:58.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.012000 audit: BPF prog-id=50 op=LOAD May 15 10:21:58.012000 audit: BPF prog-id=28 op=UNLOAD May 15 10:21:58.012000 audit: BPF prog-id=29 op=UNLOAD May 15 10:21:58.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.014000 audit: BPF prog-id=51 op=LOAD May 15 10:21:58.014000 audit: BPF prog-id=30 op=UNLOAD May 15 10:21:58.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.014000 audit: BPF prog-id=52 op=LOAD May 15 10:21:58.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.014000 audit: BPF prog-id=53 op=LOAD May 15 10:21:58.014000 audit: BPF prog-id=31 op=UNLOAD May 15 10:21:58.014000 audit: BPF prog-id=32 op=UNLOAD May 15 10:21:58.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.016000 audit: BPF prog-id=54 op=LOAD May 15 10:21:58.016000 audit: BPF prog-id=41 op=UNLOAD May 15 10:21:58.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.016000 audit: BPF prog-id=55 op=LOAD May 15 10:21:58.016000 audit: BPF prog-id=33 op=UNLOAD May 15 10:21:58.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.017000 audit: BPF prog-id=56 op=LOAD May 15 10:21:58.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:21:58.017000 audit: BPF prog-id=57 op=LOAD May 15 10:21:58.017000 audit: BPF prog-id=34 op=UNLOAD May 15 10:21:58.017000 audit: BPF prog-id=35 op=UNLOAD May 15 10:21:58.024000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:58.025739 systemd[1]: Started kubelet.service. May 15 10:21:58.028629 systemd[1]: Stopping kubelet.service... May 15 10:21:58.029244 systemd[1]: kubelet.service: Deactivated successfully. May 15 10:21:58.029407 systemd[1]: Stopped kubelet.service. May 15 10:21:58.028000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:58.030781 systemd[1]: Starting kubelet.service... May 15 10:21:58.114263 systemd[1]: Started kubelet.service. May 15 10:21:58.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:21:58.158333 kubelet[1456]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 10:21:58.158333 kubelet[1456]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 15 10:21:58.158333 kubelet[1456]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 10:21:58.158696 kubelet[1456]: I0515 10:21:58.158523 1456 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 15 10:22:00.498066 kubelet[1456]: I0515 10:22:00.498010 1456 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" May 15 10:22:00.498066 kubelet[1456]: I0515 10:22:00.498043 1456 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 15 10:22:00.498494 kubelet[1456]: I0515 10:22:00.498256 1456 server.go:927] "Client rotation is on, will bootstrap in background" May 15 10:22:00.525898 kubelet[1456]: I0515 10:22:00.525852 1456 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 15 10:22:00.541274 kubelet[1456]: I0515 10:22:00.541235 1456 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 15 10:22:00.541700 kubelet[1456]: I0515 10:22:00.541658 1456 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 15 10:22:00.542762 kubelet[1456]: I0515 10:22:00.541687 1456 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.0.0.109","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} May 15 10:22:00.542859 kubelet[1456]: I0515 10:22:00.542849 1456 topology_manager.go:138] "Creating topology manager with none policy" May 15 10:22:00.542889 kubelet[1456]: I0515 10:22:00.542865 1456 container_manager_linux.go:301] "Creating device plugin manager" May 15 10:22:00.543771 kubelet[1456]: I0515 10:22:00.543729 1456 state_mem.go:36] "Initialized new in-memory state store" May 15 10:22:00.546525 kubelet[1456]: I0515 10:22:00.546499 1456 kubelet.go:400] "Attempting to sync node with API server" May 15 10:22:00.546525 kubelet[1456]: I0515 10:22:00.546527 1456 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" May 15 10:22:00.546811 kubelet[1456]: I0515 10:22:00.546747 1456 kubelet.go:312] "Adding apiserver pod source" May 15 10:22:00.546857 kubelet[1456]: I0515 10:22:00.546846 1456 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 15 10:22:00.547018 kubelet[1456]: E0515 10:22:00.546989 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:00.547069 kubelet[1456]: E0515 10:22:00.547040 1456 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:00.548277 kubelet[1456]: I0515 10:22:00.548249 1456 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 15 10:22:00.548722 kubelet[1456]: I0515 10:22:00.548705 1456 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 15 10:22:00.548830 kubelet[1456]: W0515 10:22:00.548817 1456 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 15 10:22:00.549637 kubelet[1456]: I0515 10:22:00.549619 1456 server.go:1264] "Started kubelet" May 15 10:22:00.549798 kubelet[1456]: I0515 10:22:00.549772 1456 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 15 10:22:00.550843 kubelet[1456]: I0515 10:22:00.550808 1456 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 15 10:22:00.550910 kubelet[1456]: I0515 10:22:00.550849 1456 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 15 10:22:00.551036 kubelet[1456]: I0515 10:22:00.551023 1456 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 15 10:22:00.549000 audit[1456]: AVC avc: denied { mac_admin } for pid=1456 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:00.549000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:22:00.549000 audit[1456]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000791800 a1=4000777200 a2=40007917d0 a3=25 items=0 ppid=1 pid=1456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:00.549000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:22:00.549000 audit[1456]: AVC avc: denied { mac_admin } for pid=1456 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:00.549000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:22:00.549000 audit[1456]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40009ca260 a1=4000777218 a2=4000791890 a3=25 items=0 ppid=1 pid=1456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:00.549000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:22:00.559562 kubelet[1456]: I0515 10:22:00.559273 1456 server.go:455] "Adding debug handlers to kubelet server" May 15 10:22:00.560341 kubelet[1456]: I0515 10:22:00.560246 1456 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 15 10:22:00.560527 kubelet[1456]: I0515 10:22:00.560501 1456 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 15 10:22:00.563082 kubelet[1456]: E0515 10:22:00.563050 1456 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.109\" not found" May 15 10:22:00.563373 kubelet[1456]: I0515 10:22:00.563360 1456 volume_manager.go:291] "Starting Kubelet Volume Manager" May 15 10:22:00.563566 kubelet[1456]: I0515 10:22:00.563551 1456 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 15 10:22:00.564676 kubelet[1456]: I0515 10:22:00.564658 1456 reconciler.go:26] "Reconciler: start to sync state" May 15 10:22:00.564865 kubelet[1456]: E0515 10:22:00.564848 1456 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 15 10:22:00.564934 kubelet[1456]: I0515 10:22:00.564853 1456 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 15 10:22:00.566327 kubelet[1456]: I0515 10:22:00.566300 1456 factory.go:221] Registration of the containerd container factory successfully May 15 10:22:00.566327 kubelet[1456]: I0515 10:22:00.566323 1456 factory.go:221] Registration of the systemd container factory successfully May 15 10:22:00.579872 kubelet[1456]: I0515 10:22:00.579836 1456 cpu_manager.go:214] "Starting CPU manager" policy="none" May 15 10:22:00.579872 kubelet[1456]: I0515 10:22:00.579858 1456 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 15 10:22:00.579872 kubelet[1456]: I0515 10:22:00.579879 1456 state_mem.go:36] "Initialized new in-memory state store" May 15 10:22:00.581000 audit[1469]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1469 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:22:00.581000 audit[1469]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffe4539870 a2=0 a3=1 items=0 ppid=1456 pid=1469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:00.581000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 15 10:22:00.646541 kubelet[1456]: I0515 10:22:00.646501 1456 policy_none.go:49] "None policy: Start" May 15 10:22:00.647000 audit[1474]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1474 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:22:00.647000 audit[1474]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffcee320d0 a2=0 a3=1 items=0 ppid=1456 pid=1474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:00.647000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 15 10:22:00.651188 kubelet[1456]: I0515 10:22:00.651165 1456 memory_manager.go:170] "Starting memorymanager" policy="None" May 15 10:22:00.651280 kubelet[1456]: I0515 10:22:00.651198 1456 state_mem.go:35] "Initializing new in-memory state store" May 15 10:22:00.653085 kubelet[1456]: E0515 10:22:00.653035 1456 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.0.0.109\" not found" node="10.0.0.109" May 15 10:22:00.666820 systemd[1]: Created slice kubepods.slice. May 15 10:22:00.668493 kubelet[1456]: I0515 10:22:00.668169 1456 kubelet_node_status.go:73] "Attempting to register node" node="10.0.0.109" May 15 10:22:00.673645 systemd[1]: Created slice kubepods-burstable.slice. May 15 10:22:00.675202 kubelet[1456]: I0515 10:22:00.674895 1456 kubelet_node_status.go:76] "Successfully registered node" node="10.0.0.109" May 15 10:22:00.655000 audit[1477]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1477 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:22:00.655000 audit[1477]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffedf403d0 a2=0 a3=1 items=0 ppid=1456 pid=1477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:00.655000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 10:22:00.678141 systemd[1]: Created slice kubepods-besteffort.slice. May 15 10:22:00.678000 audit[1482]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1482 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:22:00.678000 audit[1482]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffdd3035b0 a2=0 a3=1 items=0 ppid=1456 pid=1482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:00.678000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 10:22:00.688024 kubelet[1456]: I0515 10:22:00.687996 1456 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 15 10:22:00.686000 audit[1456]: AVC avc: denied { mac_admin } for pid=1456 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:00.686000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:22:00.686000 audit[1456]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400091fc20 a1=4000c09c98 a2=400091fbf0 a3=25 items=0 ppid=1 pid=1456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:00.686000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:22:00.688299 kubelet[1456]: I0515 10:22:00.688082 1456 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 15 10:22:00.688299 kubelet[1456]: I0515 10:22:00.688215 1456 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 15 10:22:00.688349 kubelet[1456]: I0515 10:22:00.688311 1456 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 15 10:22:00.690288 kubelet[1456]: I0515 10:22:00.690266 1456 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" May 15 10:22:00.691390 env[1207]: time="2025-05-15T10:22:00.690682366Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 15 10:22:00.692893 kubelet[1456]: I0515 10:22:00.692379 1456 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" May 15 10:22:00.725000 audit[1488]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1488 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:22:00.725000 audit[1488]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffeabbe2a0 a2=0 a3=1 items=0 ppid=1456 pid=1488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:00.725000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 15 10:22:00.727288 kubelet[1456]: I0515 10:22:00.727244 1456 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 15 10:22:00.727000 audit[1489]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1489 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:22:00.727000 audit[1489]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffd64a3930 a2=0 a3=1 items=0 ppid=1456 pid=1489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:00.727000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 15 10:22:00.727000 audit[1490]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1490 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:22:00.727000 audit[1490]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe6bb2850 a2=0 a3=1 items=0 ppid=1456 pid=1490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:00.727000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 15 10:22:00.729022 kubelet[1456]: I0515 10:22:00.728979 1456 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 15 10:22:00.729243 kubelet[1456]: I0515 10:22:00.729216 1456 status_manager.go:217] "Starting to sync pod status with apiserver" May 15 10:22:00.729305 kubelet[1456]: I0515 10:22:00.729248 1456 kubelet.go:2337] "Starting kubelet main sync loop" May 15 10:22:00.729305 kubelet[1456]: E0515 10:22:00.729300 1456 kubelet.go:2361] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" May 15 10:22:00.729000 audit[1492]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1492 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:22:00.729000 audit[1492]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff1137990 a2=0 a3=1 items=0 ppid=1456 pid=1492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:00.729000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 15 10:22:00.729000 audit[1491]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=1491 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:22:00.729000 audit[1491]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffcf8ca2b0 a2=0 a3=1 items=0 ppid=1456 pid=1491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:00.729000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 15 10:22:00.730000 audit[1493]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=1493 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:22:00.730000 audit[1493]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffd50d6150 a2=0 a3=1 items=0 ppid=1456 pid=1493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:00.730000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 15 10:22:00.731000 audit[1494]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1494 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:22:00.731000 audit[1494]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd7da3c70 a2=0 a3=1 items=0 ppid=1456 pid=1494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:00.731000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 15 10:22:00.732000 audit[1495]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1495 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:22:00.732000 audit[1495]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffd6ef74a0 a2=0 a3=1 items=0 ppid=1456 pid=1495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:00.732000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 15 10:22:01.173008 sudo[1345]: pam_unix(sudo:session): session closed for user root May 15 10:22:01.171000 audit[1345]: USER_END pid=1345 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:22:01.172000 audit[1345]: CRED_DISP pid=1345 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:22:01.177062 sshd[1341]: pam_unix(sshd:session): session closed for user core May 15 10:22:01.176000 audit[1341]: USER_END pid=1341 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:01.176000 audit[1341]: CRED_DISP pid=1341 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:22:01.179566 systemd[1]: sshd@6-10.0.0.109:22-10.0.0.1:43108.service: Deactivated successfully. May 15 10:22:01.178000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.109:22-10.0.0.1:43108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:22:01.180622 systemd[1]: session-7.scope: Deactivated successfully. May 15 10:22:01.181712 systemd-logind[1197]: Session 7 logged out. Waiting for processes to exit. May 15 10:22:01.182597 systemd-logind[1197]: Removed session 7. May 15 10:22:01.500253 kubelet[1456]: I0515 10:22:01.500109 1456 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" May 15 10:22:01.500549 kubelet[1456]: W0515 10:22:01.500300 1456 reflector.go:470] k8s.io/client-go/informers/factory.go:160: watch of *v1.Service ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 15 10:22:01.500716 kubelet[1456]: W0515 10:22:01.500642 1456 reflector.go:470] k8s.io/client-go/informers/factory.go:160: watch of *v1.CSIDriver ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 15 10:22:01.500716 kubelet[1456]: W0515 10:22:01.500656 1456 reflector.go:470] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 15 10:22:01.547347 kubelet[1456]: I0515 10:22:01.547302 1456 apiserver.go:52] "Watching apiserver" May 15 10:22:01.547485 kubelet[1456]: E0515 10:22:01.547300 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:01.553885 kubelet[1456]: I0515 10:22:01.553841 1456 topology_manager.go:215] "Topology Admit Handler" podUID="1f72d0de-b17c-46e5-a7cd-72d06530b0ba" podNamespace="calico-system" podName="calico-node-5c6pl" May 15 10:22:01.553962 kubelet[1456]: I0515 10:22:01.553939 1456 topology_manager.go:215] "Topology Admit Handler" podUID="6a630004-415d-4244-b5b8-5916901b6ead" podNamespace="calico-system" podName="csi-node-driver-r2jpz" May 15 10:22:01.554292 kubelet[1456]: I0515 10:22:01.554266 1456 topology_manager.go:215] "Topology Admit Handler" podUID="0bd4cfd1-2d45-453a-b861-1eeb867d520f" podNamespace="kube-system" podName="kube-proxy-8vczc" May 15 10:22:01.554596 kubelet[1456]: E0515 10:22:01.554563 1456 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-r2jpz" podUID="6a630004-415d-4244-b5b8-5916901b6ead" May 15 10:22:01.563149 systemd[1]: Created slice kubepods-besteffort-pod0bd4cfd1_2d45_453a_b861_1eeb867d520f.slice. May 15 10:22:01.564157 kubelet[1456]: I0515 10:22:01.564106 1456 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 15 10:22:01.571579 kubelet[1456]: I0515 10:22:01.571541 1456 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/1f72d0de-b17c-46e5-a7cd-72d06530b0ba-lib-modules\") pod \"calico-node-5c6pl\" (UID: \"1f72d0de-b17c-46e5-a7cd-72d06530b0ba\") " pod="calico-system/calico-node-5c6pl" May 15 10:22:01.571579 kubelet[1456]: I0515 10:22:01.571582 1456 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/0bd4cfd1-2d45-453a-b861-1eeb867d520f-xtables-lock\") pod \"kube-proxy-8vczc\" (UID: \"0bd4cfd1-2d45-453a-b861-1eeb867d520f\") " pod="kube-system/kube-proxy-8vczc" May 15 10:22:01.571727 kubelet[1456]: I0515 10:22:01.571606 1456 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/1f72d0de-b17c-46e5-a7cd-72d06530b0ba-node-certs\") pod \"calico-node-5c6pl\" (UID: \"1f72d0de-b17c-46e5-a7cd-72d06530b0ba\") " pod="calico-system/calico-node-5c6pl" May 15 10:22:01.571727 kubelet[1456]: I0515 10:22:01.571625 1456 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/1f72d0de-b17c-46e5-a7cd-72d06530b0ba-var-run-calico\") pod \"calico-node-5c6pl\" (UID: \"1f72d0de-b17c-46e5-a7cd-72d06530b0ba\") " pod="calico-system/calico-node-5c6pl" May 15 10:22:01.571727 kubelet[1456]: I0515 10:22:01.571642 1456 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/1f72d0de-b17c-46e5-a7cd-72d06530b0ba-var-lib-calico\") pod \"calico-node-5c6pl\" (UID: \"1f72d0de-b17c-46e5-a7cd-72d06530b0ba\") " pod="calico-system/calico-node-5c6pl" May 15 10:22:01.571727 kubelet[1456]: I0515 10:22:01.571657 1456 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/6a630004-415d-4244-b5b8-5916901b6ead-varrun\") pod \"csi-node-driver-r2jpz\" (UID: \"6a630004-415d-4244-b5b8-5916901b6ead\") " pod="calico-system/csi-node-driver-r2jpz" May 15 10:22:01.571727 kubelet[1456]: I0515 10:22:01.571674 1456 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/6a630004-415d-4244-b5b8-5916901b6ead-socket-dir\") pod \"csi-node-driver-r2jpz\" (UID: \"6a630004-415d-4244-b5b8-5916901b6ead\") " pod="calico-system/csi-node-driver-r2jpz" May 15 10:22:01.571851 kubelet[1456]: I0515 10:22:01.571694 1456 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jm4vr\" (UniqueName: \"kubernetes.io/projected/6a630004-415d-4244-b5b8-5916901b6ead-kube-api-access-jm4vr\") pod \"csi-node-driver-r2jpz\" (UID: \"6a630004-415d-4244-b5b8-5916901b6ead\") " pod="calico-system/csi-node-driver-r2jpz" May 15 10:22:01.571851 kubelet[1456]: I0515 10:22:01.571712 1456 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/1f72d0de-b17c-46e5-a7cd-72d06530b0ba-xtables-lock\") pod \"calico-node-5c6pl\" (UID: \"1f72d0de-b17c-46e5-a7cd-72d06530b0ba\") " pod="calico-system/calico-node-5c6pl" May 15 10:22:01.571851 kubelet[1456]: I0515 10:22:01.571727 1456 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1f72d0de-b17c-46e5-a7cd-72d06530b0ba-tigera-ca-bundle\") pod \"calico-node-5c6pl\" (UID: \"1f72d0de-b17c-46e5-a7cd-72d06530b0ba\") " pod="calico-system/calico-node-5c6pl" May 15 10:22:01.571851 kubelet[1456]: I0515 10:22:01.571743 1456 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/1f72d0de-b17c-46e5-a7cd-72d06530b0ba-cni-log-dir\") pod \"calico-node-5c6pl\" (UID: \"1f72d0de-b17c-46e5-a7cd-72d06530b0ba\") " pod="calico-system/calico-node-5c6pl" May 15 10:22:01.571851 kubelet[1456]: I0515 10:22:01.571759 1456 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/1f72d0de-b17c-46e5-a7cd-72d06530b0ba-flexvol-driver-host\") pod \"calico-node-5c6pl\" (UID: \"1f72d0de-b17c-46e5-a7cd-72d06530b0ba\") " pod="calico-system/calico-node-5c6pl" May 15 10:22:01.571953 kubelet[1456]: I0515 10:22:01.571781 1456 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vcmcz\" (UniqueName: \"kubernetes.io/projected/1f72d0de-b17c-46e5-a7cd-72d06530b0ba-kube-api-access-vcmcz\") pod \"calico-node-5c6pl\" (UID: \"1f72d0de-b17c-46e5-a7cd-72d06530b0ba\") " pod="calico-system/calico-node-5c6pl" May 15 10:22:01.571953 kubelet[1456]: I0515 10:22:01.571796 1456 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/6a630004-415d-4244-b5b8-5916901b6ead-kubelet-dir\") pod \"csi-node-driver-r2jpz\" (UID: \"6a630004-415d-4244-b5b8-5916901b6ead\") " pod="calico-system/csi-node-driver-r2jpz" May 15 10:22:01.572249 kubelet[1456]: I0515 10:22:01.572217 1456 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-twmgz\" (UniqueName: \"kubernetes.io/projected/0bd4cfd1-2d45-453a-b861-1eeb867d520f-kube-api-access-twmgz\") pod \"kube-proxy-8vczc\" (UID: \"0bd4cfd1-2d45-453a-b861-1eeb867d520f\") " pod="kube-system/kube-proxy-8vczc" May 15 10:22:01.572306 kubelet[1456]: I0515 10:22:01.572268 1456 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/1f72d0de-b17c-46e5-a7cd-72d06530b0ba-policysync\") pod \"calico-node-5c6pl\" (UID: \"1f72d0de-b17c-46e5-a7cd-72d06530b0ba\") " pod="calico-system/calico-node-5c6pl" May 15 10:22:01.572502 kubelet[1456]: I0515 10:22:01.572459 1456 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/1f72d0de-b17c-46e5-a7cd-72d06530b0ba-cni-net-dir\") pod \"calico-node-5c6pl\" (UID: \"1f72d0de-b17c-46e5-a7cd-72d06530b0ba\") " pod="calico-system/calico-node-5c6pl" May 15 10:22:01.572550 kubelet[1456]: I0515 10:22:01.572517 1456 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/0bd4cfd1-2d45-453a-b861-1eeb867d520f-kube-proxy\") pod \"kube-proxy-8vczc\" (UID: \"0bd4cfd1-2d45-453a-b861-1eeb867d520f\") " pod="kube-system/kube-proxy-8vczc" May 15 10:22:01.572575 kubelet[1456]: I0515 10:22:01.572558 1456 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/0bd4cfd1-2d45-453a-b861-1eeb867d520f-lib-modules\") pod \"kube-proxy-8vczc\" (UID: \"0bd4cfd1-2d45-453a-b861-1eeb867d520f\") " pod="kube-system/kube-proxy-8vczc" May 15 10:22:01.572597 kubelet[1456]: I0515 10:22:01.572580 1456 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/1f72d0de-b17c-46e5-a7cd-72d06530b0ba-cni-bin-dir\") pod \"calico-node-5c6pl\" (UID: \"1f72d0de-b17c-46e5-a7cd-72d06530b0ba\") " pod="calico-system/calico-node-5c6pl" May 15 10:22:01.572619 kubelet[1456]: I0515 10:22:01.572599 1456 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/6a630004-415d-4244-b5b8-5916901b6ead-registration-dir\") pod \"csi-node-driver-r2jpz\" (UID: \"6a630004-415d-4244-b5b8-5916901b6ead\") " pod="calico-system/csi-node-driver-r2jpz" May 15 10:22:01.579072 systemd[1]: Created slice kubepods-besteffort-pod1f72d0de_b17c_46e5_a7cd_72d06530b0ba.slice. May 15 10:22:01.678139 kubelet[1456]: E0515 10:22:01.678034 1456 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:22:01.678139 kubelet[1456]: W0515 10:22:01.678057 1456 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:22:01.678139 kubelet[1456]: E0515 10:22:01.678081 1456 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:22:01.688918 kubelet[1456]: E0515 10:22:01.688889 1456 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:22:01.688918 kubelet[1456]: W0515 10:22:01.688911 1456 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:22:01.689032 kubelet[1456]: E0515 10:22:01.688928 1456 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:22:01.690178 kubelet[1456]: E0515 10:22:01.690161 1456 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:22:01.690261 kubelet[1456]: W0515 10:22:01.690248 1456 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:22:01.690319 kubelet[1456]: E0515 10:22:01.690308 1456 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:22:01.690931 kubelet[1456]: E0515 10:22:01.690917 1456 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:22:01.691026 kubelet[1456]: W0515 10:22:01.691013 1456 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:22:01.691106 kubelet[1456]: E0515 10:22:01.691074 1456 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:22:01.877004 kubelet[1456]: E0515 10:22:01.876903 1456 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:22:01.877891 env[1207]: time="2025-05-15T10:22:01.877849024Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-8vczc,Uid:0bd4cfd1-2d45-453a-b861-1eeb867d520f,Namespace:kube-system,Attempt:0,}" May 15 10:22:01.881366 kubelet[1456]: E0515 10:22:01.881345 1456 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:22:01.881947 env[1207]: time="2025-05-15T10:22:01.881904630Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-5c6pl,Uid:1f72d0de-b17c-46e5-a7cd-72d06530b0ba,Namespace:calico-system,Attempt:0,}" May 15 10:22:02.447986 env[1207]: time="2025-05-15T10:22:02.447939034Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:02.449342 env[1207]: time="2025-05-15T10:22:02.449310026Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:02.451073 env[1207]: time="2025-05-15T10:22:02.451026300Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:02.452203 env[1207]: time="2025-05-15T10:22:02.452175379Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:02.454561 env[1207]: time="2025-05-15T10:22:02.454531815Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:02.456810 env[1207]: time="2025-05-15T10:22:02.456781948Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:02.459210 env[1207]: time="2025-05-15T10:22:02.459182847Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:02.460139 env[1207]: time="2025-05-15T10:22:02.460111398Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:02.478852 env[1207]: time="2025-05-15T10:22:02.478775940Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:22:02.478852 env[1207]: time="2025-05-15T10:22:02.478814898Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:22:02.478852 env[1207]: time="2025-05-15T10:22:02.478825034Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:22:02.479021 env[1207]: time="2025-05-15T10:22:02.478953430Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:22:02.479021 env[1207]: time="2025-05-15T10:22:02.478988667Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:22:02.479021 env[1207]: time="2025-05-15T10:22:02.478999159Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:22:02.479108 env[1207]: time="2025-05-15T10:22:02.479073275Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a063e1a18223b40ffea06e77cc9753ae16641f687425717b0d0cc683685694f7 pid=1524 runtime=io.containerd.runc.v2 May 15 10:22:02.479212 env[1207]: time="2025-05-15T10:22:02.479167465Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e3b57b0b6345b1d5304e1be1537c6b996732a99a0f3fe7ec502f2d181b920e65 pid=1523 runtime=io.containerd.runc.v2 May 15 10:22:02.497514 systemd[1]: Started cri-containerd-a063e1a18223b40ffea06e77cc9753ae16641f687425717b0d0cc683685694f7.scope. May 15 10:22:02.501718 systemd[1]: Started cri-containerd-e3b57b0b6345b1d5304e1be1537c6b996732a99a0f3fe7ec502f2d181b920e65.scope. May 15 10:22:02.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.527212 kernel: kauditd_printk_skb: 243 callbacks suppressed May 15 10:22:02.527304 kernel: audit: type=1400 audit(1747304522.524:421): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.529790 kernel: audit: type=1400 audit(1747304522.524:422): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.529835 kernel: audit: type=1400 audit(1747304522.524:423): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.531655 kernel: audit: type=1400 audit(1747304522.524:424): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.533807 kernel: audit: type=1400 audit(1747304522.524:425): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.537247 kernel: audit: type=1400 audit(1747304522.524:426): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.537298 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 15 10:22:02.537318 kernel: audit: type=1400 audit(1747304522.524:427): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.539506 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 May 15 10:22:02.539573 kernel: audit: type=1400 audit(1747304522.524:428): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.525000 audit: BPF prog-id=58 op=LOAD May 15 10:22:02.528000 audit[1544]: AVC avc: denied { bpf } for pid=1544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.528000 audit[1544]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1524 pid=1544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:02.528000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130363365316131383232336234306666656130366537376363393735 May 15 10:22:02.528000 audit[1544]: AVC avc: denied { perfmon } for pid=1544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.528000 audit[1544]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1524 pid=1544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:02.528000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130363365316131383232336234306666656130366537376363393735 May 15 10:22:02.528000 audit[1544]: AVC avc: denied { bpf } for pid=1544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.528000 audit[1544]: AVC avc: denied { bpf } for pid=1544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.528000 audit[1544]: AVC avc: denied { bpf } for pid=1544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.528000 audit[1544]: AVC avc: denied { perfmon } for pid=1544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.528000 audit[1544]: AVC avc: denied { perfmon } for pid=1544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.528000 audit[1544]: AVC avc: denied { perfmon } for pid=1544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.528000 audit[1544]: AVC avc: denied { perfmon } for pid=1544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.528000 audit[1544]: AVC avc: denied { perfmon } for pid=1544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.528000 audit[1544]: AVC avc: denied { bpf } for pid=1544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.528000 audit[1544]: AVC avc: denied { bpf } for pid=1544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.528000 audit: BPF prog-id=59 op=LOAD May 15 10:22:02.528000 audit[1544]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1524 pid=1544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:02.528000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130363365316131383232336234306666656130366537376363393735 May 15 10:22:02.530000 audit[1544]: AVC avc: denied { bpf } for pid=1544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.530000 audit[1544]: AVC avc: denied { bpf } for pid=1544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.530000 audit[1544]: AVC avc: denied { perfmon } for pid=1544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.530000 audit[1544]: AVC avc: denied { perfmon } for pid=1544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.530000 audit[1544]: AVC avc: denied { perfmon } for pid=1544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.530000 audit[1544]: AVC avc: denied { perfmon } for pid=1544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.530000 audit[1544]: AVC avc: denied { perfmon } for pid=1544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.530000 audit[1544]: AVC avc: denied { bpf } for pid=1544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.531000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.531000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.532000 audit: BPF prog-id=60 op=LOAD May 15 10:22:02.530000 audit[1544]: AVC avc: denied { bpf } for pid=1544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.530000 audit: BPF prog-id=61 op=LOAD May 15 10:22:02.530000 audit[1544]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1524 pid=1544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:02.530000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130363365316131383232336234306666656130366537376363393735 May 15 10:22:02.532000 audit: BPF prog-id=61 op=UNLOAD May 15 10:22:02.532000 audit: BPF prog-id=59 op=UNLOAD May 15 10:22:02.532000 audit[1544]: AVC avc: denied { bpf } for pid=1544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.532000 audit[1544]: AVC avc: denied { bpf } for pid=1544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.532000 audit[1544]: AVC avc: denied { bpf } for pid=1544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.532000 audit[1544]: AVC avc: denied { perfmon } for pid=1544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.532000 audit[1544]: AVC avc: denied { perfmon } for pid=1544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.532000 audit[1544]: AVC avc: denied { perfmon } for pid=1544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.532000 audit[1544]: AVC avc: denied { perfmon } for pid=1544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.532000 audit[1544]: AVC avc: denied { perfmon } for pid=1544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.532000 audit[1544]: AVC avc: denied { bpf } for pid=1544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.533000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.533000 audit[1549]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=1523 pid=1549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:02.532000 audit[1544]: AVC avc: denied { bpf } for pid=1544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.532000 audit[1544]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1524 pid=1544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:02.532000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130363365316131383232336234306666656130366537376363393735 May 15 10:22:02.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533623537623062363334356231643533303465316265313533376336 May 15 10:22:02.540000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.540000 audit[1549]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=1523 pid=1549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:02.540000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533623537623062363334356231643533303465316265313533376336 May 15 10:22:02.540000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.540000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.540000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.540000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.540000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.540000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.540000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.540000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.540000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.540000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.540000 audit: BPF prog-id=63 op=LOAD May 15 10:22:02.540000 audit[1549]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=1523 pid=1549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:02.540000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533623537623062363334356231643533303465316265313533376336 May 15 10:22:02.540000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.540000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.540000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.540000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.540000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.540000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.540000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.540000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.540000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.540000 audit: BPF prog-id=64 op=LOAD May 15 10:22:02.540000 audit[1549]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=1523 pid=1549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:02.540000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533623537623062363334356231643533303465316265313533376336 May 15 10:22:02.540000 audit: BPF prog-id=64 op=UNLOAD May 15 10:22:02.540000 audit: BPF prog-id=63 op=UNLOAD May 15 10:22:02.540000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.540000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.540000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.540000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.540000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.540000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.540000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.540000 audit[1549]: AVC avc: denied { perfmon } for pid=1549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.540000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.540000 audit[1549]: AVC avc: denied { bpf } for pid=1549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:02.540000 audit: BPF prog-id=65 op=LOAD May 15 10:22:02.540000 audit[1549]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=1523 pid=1549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:02.540000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533623537623062363334356231643533303465316265313533376336 May 15 10:22:02.547520 kubelet[1456]: E0515 10:22:02.547488 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:02.556180 env[1207]: time="2025-05-15T10:22:02.556138834Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-5c6pl,Uid:1f72d0de-b17c-46e5-a7cd-72d06530b0ba,Namespace:calico-system,Attempt:0,} returns sandbox id \"e3b57b0b6345b1d5304e1be1537c6b996732a99a0f3fe7ec502f2d181b920e65\"" May 15 10:22:02.556449 env[1207]: time="2025-05-15T10:22:02.556170706Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-8vczc,Uid:0bd4cfd1-2d45-453a-b861-1eeb867d520f,Namespace:kube-system,Attempt:0,} returns sandbox id \"a063e1a18223b40ffea06e77cc9753ae16641f687425717b0d0cc683685694f7\"" May 15 10:22:02.557405 kubelet[1456]: E0515 10:22:02.557368 1456 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:22:02.557637 kubelet[1456]: E0515 10:22:02.557617 1456 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:22:02.558881 env[1207]: time="2025-05-15T10:22:02.558831170Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 15 10:22:02.680857 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4082999169.mount: Deactivated successfully. May 15 10:22:03.547899 kubelet[1456]: E0515 10:22:03.547861 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:03.659559 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3991781840.mount: Deactivated successfully. May 15 10:22:03.730293 kubelet[1456]: E0515 10:22:03.730223 1456 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-r2jpz" podUID="6a630004-415d-4244-b5b8-5916901b6ead" May 15 10:22:03.800793 env[1207]: time="2025-05-15T10:22:03.800691817Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:03.802173 env[1207]: time="2025-05-15T10:22:03.802144019Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:dd8e710a588cc6f5834c4d84f7e12458efae593d3dfe527ca9e757c89239ecb8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:03.803356 env[1207]: time="2025-05-15T10:22:03.803333389Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:03.804305 env[1207]: time="2025-05-15T10:22:03.804277645Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:03.804826 env[1207]: time="2025-05-15T10:22:03.804800061Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:dd8e710a588cc6f5834c4d84f7e12458efae593d3dfe527ca9e757c89239ecb8\"" May 15 10:22:03.806534 env[1207]: time="2025-05-15T10:22:03.806506454Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.12\"" May 15 10:22:03.807474 env[1207]: time="2025-05-15T10:22:03.807442862Z" level=info msg="CreateContainer within sandbox \"e3b57b0b6345b1d5304e1be1537c6b996732a99a0f3fe7ec502f2d181b920e65\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 15 10:22:03.819987 env[1207]: time="2025-05-15T10:22:03.819943371Z" level=info msg="CreateContainer within sandbox \"e3b57b0b6345b1d5304e1be1537c6b996732a99a0f3fe7ec502f2d181b920e65\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"ff719933b16667d660537e4e49e9350c032f4e40e681de60f772bf3d0c26101f\"" May 15 10:22:03.820768 env[1207]: time="2025-05-15T10:22:03.820735121Z" level=info msg="StartContainer for \"ff719933b16667d660537e4e49e9350c032f4e40e681de60f772bf3d0c26101f\"" May 15 10:22:03.837104 systemd[1]: Started cri-containerd-ff719933b16667d660537e4e49e9350c032f4e40e681de60f772bf3d0c26101f.scope. May 15 10:22:03.859000 audit[1597]: AVC avc: denied { perfmon } for pid=1597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:03.859000 audit[1597]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1523 pid=1597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:03.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666373139393333623136363637643636303533376534653439653933 May 15 10:22:03.859000 audit[1597]: AVC avc: denied { bpf } for pid=1597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:03.859000 audit[1597]: AVC avc: denied { bpf } for pid=1597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:03.859000 audit[1597]: AVC avc: denied { bpf } for pid=1597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:03.859000 audit[1597]: AVC avc: denied { perfmon } for pid=1597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:03.859000 audit[1597]: AVC avc: denied { perfmon } for pid=1597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:03.859000 audit[1597]: AVC avc: denied { perfmon } for pid=1597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:03.859000 audit[1597]: AVC avc: denied { perfmon } for pid=1597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:03.859000 audit[1597]: AVC avc: denied { perfmon } for pid=1597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:03.859000 audit[1597]: AVC avc: denied { bpf } for pid=1597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:03.859000 audit[1597]: AVC avc: denied { bpf } for pid=1597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:03.859000 audit: BPF prog-id=66 op=LOAD May 15 10:22:03.859000 audit[1597]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1523 pid=1597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:03.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666373139393333623136363637643636303533376534653439653933 May 15 10:22:03.860000 audit[1597]: AVC avc: denied { bpf } for pid=1597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:03.860000 audit[1597]: AVC avc: denied { bpf } for pid=1597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:03.860000 audit[1597]: AVC avc: denied { perfmon } for pid=1597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:03.860000 audit[1597]: AVC avc: denied { perfmon } for pid=1597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:03.860000 audit[1597]: AVC avc: denied { perfmon } for pid=1597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:03.860000 audit[1597]: AVC avc: denied { perfmon } for pid=1597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:03.860000 audit[1597]: AVC avc: denied { perfmon } for pid=1597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:03.860000 audit[1597]: AVC avc: denied { bpf } for pid=1597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:03.860000 audit[1597]: AVC avc: denied { bpf } for pid=1597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:03.860000 audit: BPF prog-id=67 op=LOAD May 15 10:22:03.860000 audit[1597]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1523 pid=1597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:03.860000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666373139393333623136363637643636303533376534653439653933 May 15 10:22:03.860000 audit: BPF prog-id=67 op=UNLOAD May 15 10:22:03.860000 audit: BPF prog-id=66 op=UNLOAD May 15 10:22:03.860000 audit[1597]: AVC avc: denied { bpf } for pid=1597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:03.860000 audit[1597]: AVC avc: denied { bpf } for pid=1597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:03.860000 audit[1597]: AVC avc: denied { bpf } for pid=1597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:03.860000 audit[1597]: AVC avc: denied { perfmon } for pid=1597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:03.860000 audit[1597]: AVC avc: denied { perfmon } for pid=1597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:03.860000 audit[1597]: AVC avc: denied { perfmon } for pid=1597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:03.860000 audit[1597]: AVC avc: denied { perfmon } for pid=1597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:03.860000 audit[1597]: AVC avc: denied { perfmon } for pid=1597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:03.860000 audit[1597]: AVC avc: denied { bpf } for pid=1597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:03.860000 audit[1597]: AVC avc: denied { bpf } for pid=1597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:03.860000 audit: BPF prog-id=68 op=LOAD May 15 10:22:03.860000 audit[1597]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1523 pid=1597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:03.860000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666373139393333623136363637643636303533376534653439653933 May 15 10:22:03.877768 env[1207]: time="2025-05-15T10:22:03.877709372Z" level=info msg="StartContainer for \"ff719933b16667d660537e4e49e9350c032f4e40e681de60f772bf3d0c26101f\" returns successfully" May 15 10:22:03.897546 systemd[1]: cri-containerd-ff719933b16667d660537e4e49e9350c032f4e40e681de60f772bf3d0c26101f.scope: Deactivated successfully. May 15 10:22:03.902000 audit: BPF prog-id=68 op=UNLOAD May 15 10:22:03.919840 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ff719933b16667d660537e4e49e9350c032f4e40e681de60f772bf3d0c26101f-rootfs.mount: Deactivated successfully. May 15 10:22:03.947160 env[1207]: time="2025-05-15T10:22:03.947049187Z" level=info msg="shim disconnected" id=ff719933b16667d660537e4e49e9350c032f4e40e681de60f772bf3d0c26101f May 15 10:22:03.947160 env[1207]: time="2025-05-15T10:22:03.947161218Z" level=warning msg="cleaning up after shim disconnected" id=ff719933b16667d660537e4e49e9350c032f4e40e681de60f772bf3d0c26101f namespace=k8s.io May 15 10:22:03.947384 env[1207]: time="2025-05-15T10:22:03.947173349Z" level=info msg="cleaning up dead shim" May 15 10:22:03.954101 env[1207]: time="2025-05-15T10:22:03.954060449Z" level=warning msg="cleanup warnings time=\"2025-05-15T10:22:03Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1637 runtime=io.containerd.runc.v2\n" May 15 10:22:04.548755 kubelet[1456]: E0515 10:22:04.548702 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:04.737857 kubelet[1456]: E0515 10:22:04.737800 1456 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:22:04.869255 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2707041936.mount: Deactivated successfully. May 15 10:22:05.285271 env[1207]: time="2025-05-15T10:22:05.285174786Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:05.286487 env[1207]: time="2025-05-15T10:22:05.286446993Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b4250a9efcae16f8d20358e204a159844e2b7e854edad08aee8791774acbdaed,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:05.287663 env[1207]: time="2025-05-15T10:22:05.287640065Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:05.288851 env[1207]: time="2025-05-15T10:22:05.288812518Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:ea8c7d5392acf6b0c11ebba78301e1a6c2dc6abcd7544102ed578e49d1c82f15,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:05.289252 env[1207]: time="2025-05-15T10:22:05.289217452Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.12\" returns image reference \"sha256:b4250a9efcae16f8d20358e204a159844e2b7e854edad08aee8791774acbdaed\"" May 15 10:22:05.290700 env[1207]: time="2025-05-15T10:22:05.290676613Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 15 10:22:05.291604 env[1207]: time="2025-05-15T10:22:05.291575151Z" level=info msg="CreateContainer within sandbox \"a063e1a18223b40ffea06e77cc9753ae16641f687425717b0d0cc683685694f7\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 15 10:22:05.301245 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4271947916.mount: Deactivated successfully. May 15 10:22:05.307280 env[1207]: time="2025-05-15T10:22:05.307233419Z" level=info msg="CreateContainer within sandbox \"a063e1a18223b40ffea06e77cc9753ae16641f687425717b0d0cc683685694f7\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"b313f25e6cf8da63f7179e69d2491cd70090e10ec423a3c471e6579b41411cc0\"" May 15 10:22:05.307907 env[1207]: time="2025-05-15T10:22:05.307870715Z" level=info msg="StartContainer for \"b313f25e6cf8da63f7179e69d2491cd70090e10ec423a3c471e6579b41411cc0\"" May 15 10:22:05.321529 systemd[1]: Started cri-containerd-b313f25e6cf8da63f7179e69d2491cd70090e10ec423a3c471e6579b41411cc0.scope. May 15 10:22:05.344000 audit[1663]: AVC avc: denied { perfmon } for pid=1663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:05.344000 audit[1663]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=1524 pid=1663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:05.344000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233313366323565366366386461363366373137396536396432343931 May 15 10:22:05.345000 audit[1663]: AVC avc: denied { bpf } for pid=1663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:05.345000 audit[1663]: AVC avc: denied { bpf } for pid=1663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:05.345000 audit[1663]: AVC avc: denied { bpf } for pid=1663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:05.345000 audit[1663]: AVC avc: denied { perfmon } for pid=1663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:05.345000 audit[1663]: AVC avc: denied { perfmon } for pid=1663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:05.345000 audit[1663]: AVC avc: denied { perfmon } for pid=1663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:05.345000 audit[1663]: AVC avc: denied { perfmon } for pid=1663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:05.345000 audit[1663]: AVC avc: denied { perfmon } for pid=1663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:05.345000 audit[1663]: AVC avc: denied { bpf } for pid=1663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:05.345000 audit[1663]: AVC avc: denied { bpf } for pid=1663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:05.345000 audit: BPF prog-id=69 op=LOAD May 15 10:22:05.345000 audit[1663]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=1524 pid=1663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:05.345000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233313366323565366366386461363366373137396536396432343931 May 15 10:22:05.345000 audit[1663]: AVC avc: denied { bpf } for pid=1663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:05.345000 audit[1663]: AVC avc: denied { bpf } for pid=1663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:05.345000 audit[1663]: AVC avc: denied { perfmon } for pid=1663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:05.345000 audit[1663]: AVC avc: denied { perfmon } for pid=1663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:05.345000 audit[1663]: AVC avc: denied { perfmon } for pid=1663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:05.345000 audit[1663]: AVC avc: denied { perfmon } for pid=1663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:05.345000 audit[1663]: AVC avc: denied { perfmon } for pid=1663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:05.345000 audit[1663]: AVC avc: denied { bpf } for pid=1663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:05.345000 audit[1663]: AVC avc: denied { bpf } for pid=1663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:05.345000 audit: BPF prog-id=70 op=LOAD May 15 10:22:05.345000 audit[1663]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=1524 pid=1663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:05.345000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233313366323565366366386461363366373137396536396432343931 May 15 10:22:05.346000 audit: BPF prog-id=70 op=UNLOAD May 15 10:22:05.346000 audit: BPF prog-id=69 op=UNLOAD May 15 10:22:05.346000 audit[1663]: AVC avc: denied { bpf } for pid=1663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:05.346000 audit[1663]: AVC avc: denied { bpf } for pid=1663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:05.346000 audit[1663]: AVC avc: denied { bpf } for pid=1663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:05.346000 audit[1663]: AVC avc: denied { perfmon } for pid=1663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:05.346000 audit[1663]: AVC avc: denied { perfmon } for pid=1663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:05.346000 audit[1663]: AVC avc: denied { perfmon } for pid=1663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:05.346000 audit[1663]: AVC avc: denied { perfmon } for pid=1663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:05.346000 audit[1663]: AVC avc: denied { perfmon } for pid=1663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:05.346000 audit[1663]: AVC avc: denied { bpf } for pid=1663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:05.346000 audit[1663]: AVC avc: denied { bpf } for pid=1663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:05.346000 audit: BPF prog-id=71 op=LOAD May 15 10:22:05.346000 audit[1663]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=1524 pid=1663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:05.346000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233313366323565366366386461363366373137396536396432343931 May 15 10:22:05.359375 env[1207]: time="2025-05-15T10:22:05.359337774Z" level=info msg="StartContainer for \"b313f25e6cf8da63f7179e69d2491cd70090e10ec423a3c471e6579b41411cc0\" returns successfully" May 15 10:22:05.463000 audit[1716]: NETFILTER_CFG table=mangle:14 family=10 entries=1 op=nft_register_chain pid=1716 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:22:05.463000 audit[1716]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe5f63c70 a2=0 a3=1 items=0 ppid=1673 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:05.463000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 15 10:22:05.464000 audit[1715]: NETFILTER_CFG table=mangle:15 family=2 entries=1 op=nft_register_chain pid=1715 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:22:05.464000 audit[1715]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc9078ed0 a2=0 a3=1 items=0 ppid=1673 pid=1715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:05.464000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 15 10:22:05.464000 audit[1717]: NETFILTER_CFG table=nat:16 family=10 entries=1 op=nft_register_chain pid=1717 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:22:05.464000 audit[1717]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffec45f8a0 a2=0 a3=1 items=0 ppid=1673 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:05.464000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 15 10:22:05.466000 audit[1720]: NETFILTER_CFG table=filter:17 family=10 entries=1 op=nft_register_chain pid=1720 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:22:05.466000 audit[1720]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe7324b80 a2=0 a3=1 items=0 ppid=1673 pid=1720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:05.466000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 15 10:22:05.466000 audit[1719]: NETFILTER_CFG table=nat:18 family=2 entries=1 op=nft_register_chain pid=1719 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:22:05.466000 audit[1719]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd8ce88a0 a2=0 a3=1 items=0 ppid=1673 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:05.466000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 15 10:22:05.467000 audit[1721]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=1721 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:22:05.467000 audit[1721]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc1f5d9e0 a2=0 a3=1 items=0 ppid=1673 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:05.467000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 15 10:22:05.550966 kubelet[1456]: E0515 10:22:05.549699 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:05.565000 audit[1722]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1722 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:22:05.565000 audit[1722]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffce6ea7e0 a2=0 a3=1 items=0 ppid=1673 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:05.565000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 15 10:22:05.569000 audit[1724]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1724 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:22:05.569000 audit[1724]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffcc1a5990 a2=0 a3=1 items=0 ppid=1673 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:05.569000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 15 10:22:05.572000 audit[1727]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1727 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:22:05.572000 audit[1727]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffd5343b10 a2=0 a3=1 items=0 ppid=1673 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:05.572000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 15 10:22:05.573000 audit[1728]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1728 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:22:05.573000 audit[1728]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff17a9f90 a2=0 a3=1 items=0 ppid=1673 pid=1728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:05.573000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 15 10:22:05.575000 audit[1730]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1730 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:22:05.575000 audit[1730]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff94f37e0 a2=0 a3=1 items=0 ppid=1673 pid=1730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:05.575000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 15 10:22:05.576000 audit[1731]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1731 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:22:05.576000 audit[1731]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc6674830 a2=0 a3=1 items=0 ppid=1673 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:05.576000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 15 10:22:05.578000 audit[1733]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1733 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:22:05.578000 audit[1733]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffeb850370 a2=0 a3=1 items=0 ppid=1673 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:05.578000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 15 10:22:05.581000 audit[1736]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1736 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:22:05.581000 audit[1736]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffff99595e0 a2=0 a3=1 items=0 ppid=1673 pid=1736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:05.581000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 15 10:22:05.581000 audit[1737]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1737 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:22:05.581000 audit[1737]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffeef9d0f0 a2=0 a3=1 items=0 ppid=1673 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:05.581000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 15 10:22:05.583000 audit[1739]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1739 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:22:05.583000 audit[1739]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffcf135340 a2=0 a3=1 items=0 ppid=1673 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:05.583000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 15 10:22:05.584000 audit[1740]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1740 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:22:05.584000 audit[1740]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffa8aba70 a2=0 a3=1 items=0 ppid=1673 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:05.584000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 15 10:22:05.586000 audit[1742]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1742 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:22:05.586000 audit[1742]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffebd5a0e0 a2=0 a3=1 items=0 ppid=1673 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:05.586000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 10:22:05.589000 audit[1745]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1745 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:22:05.589000 audit[1745]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffafd7a40 a2=0 a3=1 items=0 ppid=1673 pid=1745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:05.589000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 10:22:05.592000 audit[1748]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1748 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:22:05.592000 audit[1748]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe420c270 a2=0 a3=1 items=0 ppid=1673 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:05.592000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 15 10:22:05.593000 audit[1749]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1749 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:22:05.593000 audit[1749]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffe87d5b60 a2=0 a3=1 items=0 ppid=1673 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:05.593000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 15 10:22:05.595000 audit[1751]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1751 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:22:05.595000 audit[1751]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffdd6b9590 a2=0 a3=1 items=0 ppid=1673 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:05.595000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 10:22:05.623000 audit[1756]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1756 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:22:05.623000 audit[1756]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=fffff1fdaf50 a2=0 a3=1 items=0 ppid=1673 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:05.623000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 10:22:05.624000 audit[1757]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1757 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:22:05.624000 audit[1757]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe09a9d80 a2=0 a3=1 items=0 ppid=1673 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:05.624000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 15 10:22:05.626000 audit[1759]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1759 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:22:05.626000 audit[1759]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffed978eb0 a2=0 a3=1 items=0 ppid=1673 pid=1759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:05.626000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 15 10:22:05.644000 audit[1765]: NETFILTER_CFG table=filter:39 family=2 entries=10 op=nft_register_rule pid=1765 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:22:05.644000 audit[1765]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6652 a0=3 a1=ffffdc4d4b60 a2=0 a3=1 items=0 ppid=1673 pid=1765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:05.644000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:22:05.666000 audit[1765]: NETFILTER_CFG table=nat:40 family=2 entries=14 op=nft_register_chain pid=1765 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:22:05.666000 audit[1765]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5508 a0=3 a1=ffffdc4d4b60 a2=0 a3=1 items=0 ppid=1673 pid=1765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:05.666000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:22:05.667000 audit[1771]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1771 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:22:05.667000 audit[1771]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffc32648f0 a2=0 a3=1 items=0 ppid=1673 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:05.667000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 15 10:22:05.670000 audit[1773]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1773 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:22:05.670000 audit[1773]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffd6e20130 a2=0 a3=1 items=0 ppid=1673 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:05.670000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 15 10:22:05.673000 audit[1776]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1776 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:22:05.673000 audit[1776]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffec9b3c70 a2=0 a3=1 items=0 ppid=1673 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:05.673000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 15 10:22:05.674000 audit[1777]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1777 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:22:05.674000 audit[1777]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff13d7cd0 a2=0 a3=1 items=0 ppid=1673 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:05.674000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 15 10:22:05.676000 audit[1779]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1779 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:22:05.676000 audit[1779]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc9ead380 a2=0 a3=1 items=0 ppid=1673 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:05.676000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 15 10:22:05.677000 audit[1780]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1780 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:22:05.677000 audit[1780]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffeeefc720 a2=0 a3=1 items=0 ppid=1673 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:05.677000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 15 10:22:05.678000 audit[1782]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1782 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:22:05.678000 audit[1782]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffef1ecc20 a2=0 a3=1 items=0 ppid=1673 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:05.678000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 15 10:22:05.681000 audit[1785]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1785 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:22:05.681000 audit[1785]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=fffff34f4940 a2=0 a3=1 items=0 ppid=1673 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:05.681000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 15 10:22:05.682000 audit[1786]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1786 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:22:05.682000 audit[1786]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc24accb0 a2=0 a3=1 items=0 ppid=1673 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:05.682000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 15 10:22:05.684000 audit[1788]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1788 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:22:05.684000 audit[1788]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffffd449e70 a2=0 a3=1 items=0 ppid=1673 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:05.684000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 15 10:22:05.685000 audit[1789]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1789 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:22:05.685000 audit[1789]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffa7d6980 a2=0 a3=1 items=0 ppid=1673 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:05.685000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 15 10:22:05.687000 audit[1791]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1791 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:22:05.687000 audit[1791]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe5e952f0 a2=0 a3=1 items=0 ppid=1673 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:05.687000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 10:22:05.690000 audit[1794]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1794 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:22:05.690000 audit[1794]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc73f1260 a2=0 a3=1 items=0 ppid=1673 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:05.690000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 15 10:22:05.694000 audit[1797]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1797 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:22:05.694000 audit[1797]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc192afd0 a2=0 a3=1 items=0 ppid=1673 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:05.694000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 15 10:22:05.695000 audit[1798]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1798 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:22:05.695000 audit[1798]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff456d6c0 a2=0 a3=1 items=0 ppid=1673 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:05.695000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 15 10:22:05.696000 audit[1800]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1800 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:22:05.696000 audit[1800]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=fffff0e68440 a2=0 a3=1 items=0 ppid=1673 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:05.696000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 10:22:05.699000 audit[1803]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1803 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:22:05.699000 audit[1803]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffe6ca5090 a2=0 a3=1 items=0 ppid=1673 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:05.699000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 10:22:05.700000 audit[1804]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1804 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:22:05.700000 audit[1804]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc5089a70 a2=0 a3=1 items=0 ppid=1673 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:05.700000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 15 10:22:05.703000 audit[1806]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1806 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:22:05.703000 audit[1806]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffc8ea5760 a2=0 a3=1 items=0 ppid=1673 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:05.703000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 15 10:22:05.703000 audit[1807]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1807 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:22:05.703000 audit[1807]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc5f827d0 a2=0 a3=1 items=0 ppid=1673 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:05.703000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 15 10:22:05.706000 audit[1809]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1809 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:22:05.706000 audit[1809]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd33230a0 a2=0 a3=1 items=0 ppid=1673 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:05.706000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 10:22:05.708000 audit[1812]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1812 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:22:05.708000 audit[1812]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffebf511a0 a2=0 a3=1 items=0 ppid=1673 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:05.708000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 10:22:05.711000 audit[1814]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1814 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 15 10:22:05.711000 audit[1814]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2004 a0=3 a1=ffffdf80a0b0 a2=0 a3=1 items=0 ppid=1673 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:05.711000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:22:05.711000 audit[1814]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1814 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 15 10:22:05.711000 audit[1814]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffdf80a0b0 a2=0 a3=1 items=0 ppid=1673 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:05.711000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:22:05.732743 kubelet[1456]: E0515 10:22:05.732693 1456 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-r2jpz" podUID="6a630004-415d-4244-b5b8-5916901b6ead" May 15 10:22:05.740510 kubelet[1456]: E0515 10:22:05.740475 1456 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:22:05.817546 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount269899902.mount: Deactivated successfully. May 15 10:22:06.550616 kubelet[1456]: E0515 10:22:06.550564 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:06.741684 kubelet[1456]: E0515 10:22:06.741641 1456 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:22:07.551747 kubelet[1456]: E0515 10:22:07.551663 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:07.729661 kubelet[1456]: E0515 10:22:07.729603 1456 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-r2jpz" podUID="6a630004-415d-4244-b5b8-5916901b6ead" May 15 10:22:08.092489 env[1207]: time="2025-05-15T10:22:08.092442638Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:08.094264 env[1207]: time="2025-05-15T10:22:08.094228028Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:add6372545fb406bb017769f222d84c50549ce13e3b19f1fbaee3d8a4aaef627,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:08.095658 env[1207]: time="2025-05-15T10:22:08.095629662Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:08.097053 env[1207]: time="2025-05-15T10:22:08.097003982Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:08.097525 env[1207]: time="2025-05-15T10:22:08.097480351Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:add6372545fb406bb017769f222d84c50549ce13e3b19f1fbaee3d8a4aaef627\"" May 15 10:22:08.100081 env[1207]: time="2025-05-15T10:22:08.100045077Z" level=info msg="CreateContainer within sandbox \"e3b57b0b6345b1d5304e1be1537c6b996732a99a0f3fe7ec502f2d181b920e65\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 15 10:22:08.111456 env[1207]: time="2025-05-15T10:22:08.111408619Z" level=info msg="CreateContainer within sandbox \"e3b57b0b6345b1d5304e1be1537c6b996732a99a0f3fe7ec502f2d181b920e65\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"9565ba75a26d8d0eb0ba3e863ff2543dae74b9db32bb2190931bbba4c6de0911\"" May 15 10:22:08.112015 env[1207]: time="2025-05-15T10:22:08.111965856Z" level=info msg="StartContainer for \"9565ba75a26d8d0eb0ba3e863ff2543dae74b9db32bb2190931bbba4c6de0911\"" May 15 10:22:08.131483 systemd[1]: Started cri-containerd-9565ba75a26d8d0eb0ba3e863ff2543dae74b9db32bb2190931bbba4c6de0911.scope. May 15 10:22:08.150000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:08.152314 kernel: kauditd_printk_skb: 346 callbacks suppressed May 15 10:22:08.152370 kernel: audit: type=1400 audit(1747304528.150:521): avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:08.150000 audit[1823]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1523 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:08.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935363562613735613236643864306562306261336538363366663235 May 15 10:22:08.159228 kernel: audit: type=1300 audit(1747304528.150:521): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1523 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:08.159283 kernel: audit: type=1327 audit(1747304528.150:521): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935363562613735613236643864306562306261336538363366663235 May 15 10:22:08.159313 kernel: audit: type=1400 audit(1747304528.150:522): avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:08.150000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:08.150000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:08.162863 kernel: audit: type=1400 audit(1747304528.150:522): avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:08.150000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:08.165236 kernel: audit: type=1400 audit(1747304528.150:522): avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:08.165293 kernel: audit: type=1400 audit(1747304528.150:522): avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:08.150000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:08.150000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:08.168728 kernel: audit: type=1400 audit(1747304528.150:522): avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:08.168769 kernel: audit: type=1400 audit(1747304528.150:522): avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:08.150000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:08.150000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:08.172313 kernel: audit: type=1400 audit(1747304528.150:522): avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:08.150000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:08.150000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:08.150000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:08.150000 audit: BPF prog-id=72 op=LOAD May 15 10:22:08.150000 audit[1823]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1523 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:08.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935363562613735613236643864306562306261336538363366663235 May 15 10:22:08.151000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:08.151000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:08.151000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:08.151000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:08.151000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:08.151000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:08.151000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:08.151000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:08.151000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:08.151000 audit: BPF prog-id=73 op=LOAD May 15 10:22:08.151000 audit[1823]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1523 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:08.151000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935363562613735613236643864306562306261336538363366663235 May 15 10:22:08.153000 audit: BPF prog-id=73 op=UNLOAD May 15 10:22:08.153000 audit: BPF prog-id=72 op=UNLOAD May 15 10:22:08.153000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:08.153000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:08.153000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:08.153000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:08.153000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:08.153000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:08.153000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:08.153000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:08.153000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:08.153000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:08.153000 audit: BPF prog-id=74 op=LOAD May 15 10:22:08.153000 audit[1823]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1523 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:08.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935363562613735613236643864306562306261336538363366663235 May 15 10:22:08.181408 env[1207]: time="2025-05-15T10:22:08.181356469Z" level=info msg="StartContainer for \"9565ba75a26d8d0eb0ba3e863ff2543dae74b9db32bb2190931bbba4c6de0911\" returns successfully" May 15 10:22:08.552525 kubelet[1456]: E0515 10:22:08.552394 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:08.662573 systemd[1]: cri-containerd-9565ba75a26d8d0eb0ba3e863ff2543dae74b9db32bb2190931bbba4c6de0911.scope: Deactivated successfully. May 15 10:22:08.669000 audit: BPF prog-id=74 op=UNLOAD May 15 10:22:08.728544 kubelet[1456]: I0515 10:22:08.728490 1456 kubelet_node_status.go:497] "Fast updating node status as it just became ready" May 15 10:22:08.746816 kubelet[1456]: E0515 10:22:08.746784 1456 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:22:08.766872 kubelet[1456]: I0515 10:22:08.766790 1456 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-8vczc" podStartSLOduration=6.035580606 podStartE2EDuration="8.766771549s" podCreationTimestamp="2025-05-15 10:22:00 +0000 UTC" firstStartedPulling="2025-05-15 10:22:02.558689905 +0000 UTC m=+4.440894253" lastFinishedPulling="2025-05-15 10:22:05.289880808 +0000 UTC m=+7.172085196" observedRunningTime="2025-05-15 10:22:05.753066025 +0000 UTC m=+7.635270412" watchObservedRunningTime="2025-05-15 10:22:08.766771549 +0000 UTC m=+10.648975937" May 15 10:22:08.853830 env[1207]: time="2025-05-15T10:22:08.853704449Z" level=info msg="shim disconnected" id=9565ba75a26d8d0eb0ba3e863ff2543dae74b9db32bb2190931bbba4c6de0911 May 15 10:22:08.853830 env[1207]: time="2025-05-15T10:22:08.853752628Z" level=warning msg="cleaning up after shim disconnected" id=9565ba75a26d8d0eb0ba3e863ff2543dae74b9db32bb2190931bbba4c6de0911 namespace=k8s.io May 15 10:22:08.853830 env[1207]: time="2025-05-15T10:22:08.853763179Z" level=info msg="cleaning up dead shim" May 15 10:22:08.861163 env[1207]: time="2025-05-15T10:22:08.861116404Z" level=warning msg="cleanup warnings time=\"2025-05-15T10:22:08Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1865 runtime=io.containerd.runc.v2\n" May 15 10:22:09.107735 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-9565ba75a26d8d0eb0ba3e863ff2543dae74b9db32bb2190931bbba4c6de0911-rootfs.mount: Deactivated successfully. May 15 10:22:09.553294 kubelet[1456]: E0515 10:22:09.553172 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:09.734706 systemd[1]: Created slice kubepods-besteffort-pod6a630004_415d_4244_b5b8_5916901b6ead.slice. May 15 10:22:09.737665 env[1207]: time="2025-05-15T10:22:09.737282714Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-r2jpz,Uid:6a630004-415d-4244-b5b8-5916901b6ead,Namespace:calico-system,Attempt:0,}" May 15 10:22:09.772601 kubelet[1456]: E0515 10:22:09.771396 1456 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:22:09.772740 env[1207]: time="2025-05-15T10:22:09.772460364Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 15 10:22:09.878818 env[1207]: time="2025-05-15T10:22:09.878676409Z" level=error msg="Failed to destroy network for sandbox \"3642ce46ecde7919d90fd28880782820cff6560929c7c30444a4374851b901e0\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:22:09.879481 env[1207]: time="2025-05-15T10:22:09.879430457Z" level=error msg="encountered an error cleaning up failed sandbox \"3642ce46ecde7919d90fd28880782820cff6560929c7c30444a4374851b901e0\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:22:09.879550 env[1207]: time="2025-05-15T10:22:09.879489460Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-r2jpz,Uid:6a630004-415d-4244-b5b8-5916901b6ead,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3642ce46ecde7919d90fd28880782820cff6560929c7c30444a4374851b901e0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:22:09.879800 kubelet[1456]: E0515 10:22:09.879724 1456 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3642ce46ecde7919d90fd28880782820cff6560929c7c30444a4374851b901e0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:22:09.879851 kubelet[1456]: E0515 10:22:09.879820 1456 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3642ce46ecde7919d90fd28880782820cff6560929c7c30444a4374851b901e0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-r2jpz" May 15 10:22:09.879851 kubelet[1456]: E0515 10:22:09.879842 1456 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3642ce46ecde7919d90fd28880782820cff6560929c7c30444a4374851b901e0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-r2jpz" May 15 10:22:09.879922 kubelet[1456]: E0515 10:22:09.879898 1456 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-r2jpz_calico-system(6a630004-415d-4244-b5b8-5916901b6ead)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-r2jpz_calico-system(6a630004-415d-4244-b5b8-5916901b6ead)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3642ce46ecde7919d90fd28880782820cff6560929c7c30444a4374851b901e0\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-r2jpz" podUID="6a630004-415d-4244-b5b8-5916901b6ead" May 15 10:22:09.880467 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-3642ce46ecde7919d90fd28880782820cff6560929c7c30444a4374851b901e0-shm.mount: Deactivated successfully. May 15 10:22:10.554107 kubelet[1456]: E0515 10:22:10.554047 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:10.773532 kubelet[1456]: I0515 10:22:10.773484 1456 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3642ce46ecde7919d90fd28880782820cff6560929c7c30444a4374851b901e0" May 15 10:22:10.774503 env[1207]: time="2025-05-15T10:22:10.774456137Z" level=info msg="StopPodSandbox for \"3642ce46ecde7919d90fd28880782820cff6560929c7c30444a4374851b901e0\"" May 15 10:22:10.807439 env[1207]: time="2025-05-15T10:22:10.807313574Z" level=error msg="StopPodSandbox for \"3642ce46ecde7919d90fd28880782820cff6560929c7c30444a4374851b901e0\" failed" error="failed to destroy network for sandbox \"3642ce46ecde7919d90fd28880782820cff6560929c7c30444a4374851b901e0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:22:10.807682 kubelet[1456]: E0515 10:22:10.807556 1456 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3642ce46ecde7919d90fd28880782820cff6560929c7c30444a4374851b901e0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3642ce46ecde7919d90fd28880782820cff6560929c7c30444a4374851b901e0" May 15 10:22:10.807682 kubelet[1456]: E0515 10:22:10.807625 1456 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3642ce46ecde7919d90fd28880782820cff6560929c7c30444a4374851b901e0"} May 15 10:22:10.807769 kubelet[1456]: E0515 10:22:10.807682 1456 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6a630004-415d-4244-b5b8-5916901b6ead\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3642ce46ecde7919d90fd28880782820cff6560929c7c30444a4374851b901e0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:22:10.807769 kubelet[1456]: E0515 10:22:10.807707 1456 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6a630004-415d-4244-b5b8-5916901b6ead\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3642ce46ecde7919d90fd28880782820cff6560929c7c30444a4374851b901e0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-r2jpz" podUID="6a630004-415d-4244-b5b8-5916901b6ead" May 15 10:22:11.554591 kubelet[1456]: E0515 10:22:11.554539 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:12.415027 kubelet[1456]: I0515 10:22:12.414931 1456 topology_manager.go:215] "Topology Admit Handler" podUID="20867e5f-93ee-4143-bedd-3485d6ec59aa" podNamespace="default" podName="nginx-deployment-85f456d6dd-ncl8p" May 15 10:22:12.425341 systemd[1]: Created slice kubepods-besteffort-pod20867e5f_93ee_4143_bedd_3485d6ec59aa.slice. May 15 10:22:12.528849 kubelet[1456]: I0515 10:22:12.528791 1456 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jdxwf\" (UniqueName: \"kubernetes.io/projected/20867e5f-93ee-4143-bedd-3485d6ec59aa-kube-api-access-jdxwf\") pod \"nginx-deployment-85f456d6dd-ncl8p\" (UID: \"20867e5f-93ee-4143-bedd-3485d6ec59aa\") " pod="default/nginx-deployment-85f456d6dd-ncl8p" May 15 10:22:12.555060 kubelet[1456]: E0515 10:22:12.554991 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:12.728617 env[1207]: time="2025-05-15T10:22:12.728508660Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-ncl8p,Uid:20867e5f-93ee-4143-bedd-3485d6ec59aa,Namespace:default,Attempt:0,}" May 15 10:22:12.870149 env[1207]: time="2025-05-15T10:22:12.870054461Z" level=error msg="Failed to destroy network for sandbox \"c3613fe0db21cc8269faf6382ab950b3e169f20b9b9e81ed1f8e164395dd74cb\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:22:12.870506 env[1207]: time="2025-05-15T10:22:12.870456181Z" level=error msg="encountered an error cleaning up failed sandbox \"c3613fe0db21cc8269faf6382ab950b3e169f20b9b9e81ed1f8e164395dd74cb\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:22:12.870561 env[1207]: time="2025-05-15T10:22:12.870514145Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-ncl8p,Uid:20867e5f-93ee-4143-bedd-3485d6ec59aa,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c3613fe0db21cc8269faf6382ab950b3e169f20b9b9e81ed1f8e164395dd74cb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:22:12.871696 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-c3613fe0db21cc8269faf6382ab950b3e169f20b9b9e81ed1f8e164395dd74cb-shm.mount: Deactivated successfully. May 15 10:22:12.871875 kubelet[1456]: E0515 10:22:12.871805 1456 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c3613fe0db21cc8269faf6382ab950b3e169f20b9b9e81ed1f8e164395dd74cb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:22:12.871875 kubelet[1456]: E0515 10:22:12.871858 1456 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c3613fe0db21cc8269faf6382ab950b3e169f20b9b9e81ed1f8e164395dd74cb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-ncl8p" May 15 10:22:12.872046 kubelet[1456]: E0515 10:22:12.871879 1456 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c3613fe0db21cc8269faf6382ab950b3e169f20b9b9e81ed1f8e164395dd74cb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-ncl8p" May 15 10:22:12.872046 kubelet[1456]: E0515 10:22:12.871918 1456 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-85f456d6dd-ncl8p_default(20867e5f-93ee-4143-bedd-3485d6ec59aa)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-85f456d6dd-ncl8p_default(20867e5f-93ee-4143-bedd-3485d6ec59aa)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c3613fe0db21cc8269faf6382ab950b3e169f20b9b9e81ed1f8e164395dd74cb\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-ncl8p" podUID="20867e5f-93ee-4143-bedd-3485d6ec59aa" May 15 10:22:13.555466 kubelet[1456]: E0515 10:22:13.555406 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:13.778959 kubelet[1456]: I0515 10:22:13.778928 1456 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c3613fe0db21cc8269faf6382ab950b3e169f20b9b9e81ed1f8e164395dd74cb" May 15 10:22:13.779472 env[1207]: time="2025-05-15T10:22:13.779436700Z" level=info msg="StopPodSandbox for \"c3613fe0db21cc8269faf6382ab950b3e169f20b9b9e81ed1f8e164395dd74cb\"" May 15 10:22:13.808353 env[1207]: time="2025-05-15T10:22:13.808222474Z" level=error msg="StopPodSandbox for \"c3613fe0db21cc8269faf6382ab950b3e169f20b9b9e81ed1f8e164395dd74cb\" failed" error="failed to destroy network for sandbox \"c3613fe0db21cc8269faf6382ab950b3e169f20b9b9e81ed1f8e164395dd74cb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:22:13.808766 kubelet[1456]: E0515 10:22:13.808609 1456 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c3613fe0db21cc8269faf6382ab950b3e169f20b9b9e81ed1f8e164395dd74cb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c3613fe0db21cc8269faf6382ab950b3e169f20b9b9e81ed1f8e164395dd74cb" May 15 10:22:13.808766 kubelet[1456]: E0515 10:22:13.808658 1456 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c3613fe0db21cc8269faf6382ab950b3e169f20b9b9e81ed1f8e164395dd74cb"} May 15 10:22:13.808766 kubelet[1456]: E0515 10:22:13.808713 1456 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"20867e5f-93ee-4143-bedd-3485d6ec59aa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c3613fe0db21cc8269faf6382ab950b3e169f20b9b9e81ed1f8e164395dd74cb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:22:13.808766 kubelet[1456]: E0515 10:22:13.808736 1456 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"20867e5f-93ee-4143-bedd-3485d6ec59aa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c3613fe0db21cc8269faf6382ab950b3e169f20b9b9e81ed1f8e164395dd74cb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-ncl8p" podUID="20867e5f-93ee-4143-bedd-3485d6ec59aa" May 15 10:22:13.882535 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4278278355.mount: Deactivated successfully. May 15 10:22:14.027851 env[1207]: time="2025-05-15T10:22:14.027801063Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:14.029589 env[1207]: time="2025-05-15T10:22:14.029558286Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cdcce3ec4624a24c28cdc07b0ee29ddf6703628edee7452a3f8a8b4816bfd057,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:14.031299 env[1207]: time="2025-05-15T10:22:14.031263415Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:14.032788 env[1207]: time="2025-05-15T10:22:14.032749316Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:14.033317 env[1207]: time="2025-05-15T10:22:14.033292598Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:cdcce3ec4624a24c28cdc07b0ee29ddf6703628edee7452a3f8a8b4816bfd057\"" May 15 10:22:14.044809 env[1207]: time="2025-05-15T10:22:14.044754921Z" level=info msg="CreateContainer within sandbox \"e3b57b0b6345b1d5304e1be1537c6b996732a99a0f3fe7ec502f2d181b920e65\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 15 10:22:14.082968 env[1207]: time="2025-05-15T10:22:14.082850655Z" level=info msg="CreateContainer within sandbox \"e3b57b0b6345b1d5304e1be1537c6b996732a99a0f3fe7ec502f2d181b920e65\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"f4697503e313228a8eb2effb395de02a26fb877cfb0cb039a1146d8f63021afd\"" May 15 10:22:14.083822 env[1207]: time="2025-05-15T10:22:14.083768964Z" level=info msg="StartContainer for \"f4697503e313228a8eb2effb395de02a26fb877cfb0cb039a1146d8f63021afd\"" May 15 10:22:14.098606 systemd[1]: Started cri-containerd-f4697503e313228a8eb2effb395de02a26fb877cfb0cb039a1146d8f63021afd.scope. May 15 10:22:14.120000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.122486 kernel: kauditd_printk_skb: 34 callbacks suppressed May 15 10:22:14.122541 kernel: audit: type=1400 audit(1747304534.120:528): avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.120000 audit[2010]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=1523 pid=2010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:14.127085 kernel: audit: type=1300 audit(1747304534.120:528): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=1523 pid=2010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:14.127157 kernel: audit: type=1327 audit(1747304534.120:528): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634363937353033653331333232386138656232656666623339356465 May 15 10:22:14.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634363937353033653331333232386138656232656666623339356465 May 15 10:22:14.120000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.131234 kernel: audit: type=1400 audit(1747304534.120:529): avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.131299 kernel: audit: type=1400 audit(1747304534.120:529): avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.120000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.120000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.134619 kernel: audit: type=1400 audit(1747304534.120:529): avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.134661 kernel: audit: type=1400 audit(1747304534.120:529): avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.120000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.120000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.138858 kernel: audit: type=1400 audit(1747304534.120:529): avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.120000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.141414 kernel: audit: type=1400 audit(1747304534.120:529): avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.120000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.120000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.120000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.120000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.120000 audit: BPF prog-id=75 op=LOAD May 15 10:22:14.120000 audit[2010]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=1523 pid=2010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:14.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634363937353033653331333232386138656232656666623339356465 May 15 10:22:14.121000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.121000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.147122 kernel: audit: type=1400 audit(1747304534.120:529): avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.121000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.121000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.121000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.121000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.121000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.121000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.121000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.121000 audit: BPF prog-id=76 op=LOAD May 15 10:22:14.121000 audit[2010]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=1523 pid=2010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:14.121000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634363937353033653331333232386138656232656666623339356465 May 15 10:22:14.123000 audit: BPF prog-id=76 op=UNLOAD May 15 10:22:14.123000 audit: BPF prog-id=75 op=UNLOAD May 15 10:22:14.123000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.123000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.123000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.123000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.123000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.123000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.123000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.123000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.123000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.123000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:14.123000 audit: BPF prog-id=77 op=LOAD May 15 10:22:14.123000 audit[2010]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=1523 pid=2010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:14.123000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634363937353033653331333232386138656232656666623339356465 May 15 10:22:14.201445 env[1207]: time="2025-05-15T10:22:14.201394972Z" level=info msg="StartContainer for \"f4697503e313228a8eb2effb395de02a26fb877cfb0cb039a1146d8f63021afd\" returns successfully" May 15 10:22:14.322633 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 15 10:22:14.322789 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 15 10:22:14.556556 kubelet[1456]: E0515 10:22:14.556451 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:14.783173 kubelet[1456]: E0515 10:22:14.783124 1456 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:22:14.805621 kubelet[1456]: I0515 10:22:14.805534 1456 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-5c6pl" podStartSLOduration=3.329415542 podStartE2EDuration="14.805518164s" podCreationTimestamp="2025-05-15 10:22:00 +0000 UTC" firstStartedPulling="2025-05-15 10:22:02.558405753 +0000 UTC m=+4.440610141" lastFinishedPulling="2025-05-15 10:22:14.034508375 +0000 UTC m=+15.916712763" observedRunningTime="2025-05-15 10:22:14.802222948 +0000 UTC m=+16.684427296" watchObservedRunningTime="2025-05-15 10:22:14.805518164 +0000 UTC m=+16.687722552" May 15 10:22:15.557059 kubelet[1456]: E0515 10:22:15.557008 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:15.603000 audit[2156]: AVC avc: denied { write } for pid=2156 comm="tee" name="fd" dev="proc" ino=13298 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:22:15.603000 audit[2156]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc3d41a2d a2=241 a3=1b6 items=1 ppid=2101 pid=2156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:15.603000 audit: CWD cwd="/etc/service/enabled/confd/log" May 15 10:22:15.603000 audit: PATH item=0 name="/dev/fd/63" inode=13295 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:22:15.603000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:22:15.604000 audit[2160]: AVC avc: denied { write } for pid=2160 comm="tee" name="fd" dev="proc" ino=13302 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:22:15.604000 audit[2160]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffcb32fa2f a2=241 a3=1b6 items=1 ppid=2100 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:15.604000 audit: CWD cwd="/etc/service/enabled/cni/log" May 15 10:22:15.604000 audit: PATH item=0 name="/dev/fd/63" inode=15365 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:22:15.604000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:22:15.611000 audit[2162]: AVC avc: denied { write } for pid=2162 comm="tee" name="fd" dev="proc" ino=14152 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:22:15.611000 audit[2162]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc9e3fa2e a2=241 a3=1b6 items=1 ppid=2113 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:15.611000 audit: CWD cwd="/etc/service/enabled/bird/log" May 15 10:22:15.611000 audit: PATH item=0 name="/dev/fd/63" inode=14146 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:22:15.611000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:22:15.614000 audit[2152]: AVC avc: denied { write } for pid=2152 comm="tee" name="fd" dev="proc" ino=15370 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:22:15.614000 audit[2152]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffcd91aa2d a2=241 a3=1b6 items=1 ppid=2099 pid=2152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:15.614000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 15 10:22:15.614000 audit: PATH item=0 name="/dev/fd/63" inode=15363 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:22:15.614000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:22:15.616000 audit[2168]: AVC avc: denied { write } for pid=2168 comm="tee" name="fd" dev="proc" ino=14156 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:22:15.616000 audit[2168]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff576fa1e a2=241 a3=1b6 items=1 ppid=2107 pid=2168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:15.616000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 15 10:22:15.616000 audit: PATH item=0 name="/dev/fd/63" inode=14149 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:22:15.616000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:22:15.619000 audit[2171]: AVC avc: denied { write } for pid=2171 comm="tee" name="fd" dev="proc" ino=14575 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:22:15.619000 audit[2177]: AVC avc: denied { write } for pid=2177 comm="tee" name="fd" dev="proc" ino=13306 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:22:15.619000 audit[2177]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff5f5ea1d a2=241 a3=1b6 items=1 ppid=2111 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:15.619000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 15 10:22:15.619000 audit: PATH item=0 name="/dev/fd/63" inode=15372 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:22:15.619000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:22:15.619000 audit[2171]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffda034a2d a2=241 a3=1b6 items=1 ppid=2104 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:15.619000 audit: CWD cwd="/etc/service/enabled/felix/log" May 15 10:22:15.619000 audit: PATH item=0 name="/dev/fd/63" inode=14572 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:22:15.619000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:22:15.784217 kubelet[1456]: E0515 10:22:15.784177 1456 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:22:15.799855 systemd[1]: run-containerd-runc-k8s.io-f4697503e313228a8eb2effb395de02a26fb877cfb0cb039a1146d8f63021afd-runc.0RzeK5.mount: Deactivated successfully. May 15 10:22:16.323000 audit[2212]: NETFILTER_CFG table=filter:65 family=2 entries=18 op=nft_register_rule pid=2212 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:22:16.323000 audit[2212]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6652 a0=3 a1=ffffdc48e420 a2=0 a3=1 items=0 ppid=1673 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:16.323000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:22:16.330000 audit[2212]: NETFILTER_CFG table=nat:66 family=2 entries=12 op=nft_register_rule pid=2212 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:22:16.330000 audit[2212]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffdc48e420 a2=0 a3=1 items=0 ppid=1673 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:16.330000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:22:16.349000 audit[2214]: NETFILTER_CFG table=filter:67 family=2 entries=18 op=nft_register_rule pid=2214 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:22:16.349000 audit[2214]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6652 a0=3 a1=ffffd07f0c00 a2=0 a3=1 items=0 ppid=1673 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:16.349000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:22:16.358000 audit[2214]: NETFILTER_CFG table=nat:68 family=2 entries=12 op=nft_register_rule pid=2214 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:22:16.358000 audit[2214]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffd07f0c00 a2=0 a3=1 items=0 ppid=1673 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:16.358000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:22:16.558037 kubelet[1456]: E0515 10:22:16.557981 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:17.323000 audit[2240]: NETFILTER_CFG table=filter:69 family=2 entries=15 op=nft_register_rule pid=2240 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:22:17.323000 audit[2240]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4420 a0=3 a1=ffffcc00fa10 a2=0 a3=1 items=0 ppid=1673 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:17.323000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:22:17.331000 audit[2240]: NETFILTER_CFG table=nat:70 family=2 entries=33 op=nft_register_chain pid=2240 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:22:17.331000 audit[2240]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13428 a0=3 a1=ffffcc00fa10 a2=0 a3=1 items=0 ppid=1673 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:17.331000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:22:17.558946 kubelet[1456]: E0515 10:22:17.558886 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:18.330000 audit[2269]: NETFILTER_CFG table=filter:71 family=2 entries=11 op=nft_register_rule pid=2269 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:22:18.330000 audit[2269]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffc5c58b70 a2=0 a3=1 items=0 ppid=1673 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:18.330000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:22:18.341000 audit[2269]: NETFILTER_CFG table=nat:72 family=2 entries=61 op=nft_register_chain pid=2269 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:22:18.341000 audit[2269]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22668 a0=3 a1=ffffc5c58b70 a2=0 a3=1 items=0 ppid=1673 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:18.341000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:22:18.559967 kubelet[1456]: E0515 10:22:18.559911 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:19.361000 audit[2297]: NETFILTER_CFG table=filter:73 family=2 entries=9 op=nft_register_rule pid=2297 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:22:19.364363 kernel: kauditd_printk_skb: 92 callbacks suppressed May 15 10:22:19.364432 kernel: audit: type=1325 audit(1747304539.361:549): table=filter:73 family=2 entries=9 op=nft_register_rule pid=2297 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:22:19.364459 kernel: audit: type=1300 audit(1747304539.361:549): arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffcee96800 a2=0 a3=1 items=0 ppid=1673 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:19.361000 audit[2297]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffcee96800 a2=0 a3=1 items=0 ppid=1673 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:19.361000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:22:19.368624 kernel: audit: type=1327 audit(1747304539.361:549): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:22:19.372000 audit[2297]: NETFILTER_CFG table=nat:74 family=2 entries=27 op=nft_register_chain pid=2297 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:22:19.372000 audit[2297]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=ffffcee96800 a2=0 a3=1 items=0 ppid=1673 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:19.377882 kernel: audit: type=1325 audit(1747304539.372:550): table=nat:74 family=2 entries=27 op=nft_register_chain pid=2297 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:22:19.377917 kernel: audit: type=1300 audit(1747304539.372:550): arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=ffffcee96800 a2=0 a3=1 items=0 ppid=1673 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:19.377937 kernel: audit: type=1327 audit(1747304539.372:550): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:22:19.372000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:22:19.560099 kubelet[1456]: E0515 10:22:19.560043 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:19.943000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.943000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.948129 kernel: audit: type=1400 audit(1747304539.943:551): avc: denied { bpf } for pid=2345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.948212 kernel: audit: type=1400 audit(1747304539.943:551): avc: denied { bpf } for pid=2345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.948236 kernel: audit: type=1400 audit(1747304539.943:551): avc: denied { perfmon } for pid=2345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.943000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.943000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.951814 kernel: audit: type=1400 audit(1747304539.943:551): avc: denied { perfmon } for pid=2345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.943000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.943000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.943000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.943000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.943000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.943000 audit: BPF prog-id=78 op=LOAD May 15 10:22:19.943000 audit[2345]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff5fd4e28 a2=98 a3=fffff5fd4e18 items=0 ppid=2300 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:19.943000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:22:19.946000 audit: BPF prog-id=78 op=UNLOAD May 15 10:22:19.946000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.946000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.946000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.946000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.946000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.946000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.946000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.946000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.946000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.946000 audit: BPF prog-id=79 op=LOAD May 15 10:22:19.946000 audit[2345]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff5fd4ab8 a2=74 a3=95 items=0 ppid=2300 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:19.946000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:22:19.947000 audit: BPF prog-id=79 op=UNLOAD May 15 10:22:19.947000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.947000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.947000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.947000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.947000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.947000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.947000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.947000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.947000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:19.947000 audit: BPF prog-id=80 op=LOAD May 15 10:22:19.947000 audit[2345]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff5fd4b18 a2=94 a3=2 items=0 ppid=2300 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:19.947000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:22:19.949000 audit: BPF prog-id=80 op=UNLOAD May 15 10:22:20.038000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.038000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.038000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.038000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.038000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.038000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.038000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.038000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.038000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.038000 audit: BPF prog-id=81 op=LOAD May 15 10:22:20.038000 audit[2345]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff5fd4ad8 a2=40 a3=fffff5fd4b08 items=0 ppid=2300 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.038000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:22:20.039000 audit: BPF prog-id=81 op=UNLOAD May 15 10:22:20.039000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.039000 audit[2345]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=fffff5fd4bf0 a2=50 a3=0 items=0 ppid=2300 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.039000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:22:20.047000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.047000 audit[2345]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff5fd4b48 a2=28 a3=fffff5fd4c78 items=0 ppid=2300 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.047000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:22:20.048000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.048000 audit[2345]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff5fd4b78 a2=28 a3=fffff5fd4ca8 items=0 ppid=2300 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.048000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:22:20.048000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.048000 audit[2345]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff5fd4a28 a2=28 a3=fffff5fd4b58 items=0 ppid=2300 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.048000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:22:20.048000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.048000 audit[2345]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff5fd4b98 a2=28 a3=fffff5fd4cc8 items=0 ppid=2300 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.048000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:22:20.048000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.048000 audit[2345]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff5fd4b78 a2=28 a3=fffff5fd4ca8 items=0 ppid=2300 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.048000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:22:20.048000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.048000 audit[2345]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff5fd4b68 a2=28 a3=fffff5fd4c98 items=0 ppid=2300 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.048000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:22:20.048000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.048000 audit[2345]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff5fd4b98 a2=28 a3=fffff5fd4cc8 items=0 ppid=2300 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.048000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:22:20.048000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.048000 audit[2345]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff5fd4b78 a2=28 a3=fffff5fd4ca8 items=0 ppid=2300 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.048000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:22:20.049000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.049000 audit[2345]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff5fd4b98 a2=28 a3=fffff5fd4cc8 items=0 ppid=2300 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.049000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:22:20.049000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.049000 audit[2345]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff5fd4b68 a2=28 a3=fffff5fd4c98 items=0 ppid=2300 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.049000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:22:20.049000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.049000 audit[2345]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff5fd4be8 a2=28 a3=fffff5fd4d28 items=0 ppid=2300 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.049000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:22:20.049000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.049000 audit[2345]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffff5fd4920 a2=50 a3=0 items=0 ppid=2300 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.049000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:22:20.049000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.049000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.049000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.049000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.049000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.049000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.049000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.049000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.049000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.049000 audit: BPF prog-id=82 op=LOAD May 15 10:22:20.049000 audit[2345]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffff5fd4928 a2=94 a3=5 items=0 ppid=2300 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.049000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:22:20.050000 audit: BPF prog-id=82 op=UNLOAD May 15 10:22:20.050000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.050000 audit[2345]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffff5fd4a30 a2=50 a3=0 items=0 ppid=2300 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.050000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:22:20.050000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.050000 audit[2345]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=fffff5fd4b78 a2=4 a3=3 items=0 ppid=2300 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.050000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:22:20.050000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.050000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.050000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.050000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.050000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.050000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.050000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.050000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.050000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.050000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.050000 audit[2345]: AVC avc: denied { confidentiality } for pid=2345 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:20.050000 audit[2345]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff5fd4b58 a2=94 a3=6 items=0 ppid=2300 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.050000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:22:20.051000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.051000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.051000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.051000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.051000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.051000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.051000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.051000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.051000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.051000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.051000 audit[2345]: AVC avc: denied { confidentiality } for pid=2345 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:20.051000 audit[2345]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff5fd4328 a2=94 a3=83 items=0 ppid=2300 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.051000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:22:20.052000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.052000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.052000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.052000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.052000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.052000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.052000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.052000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.052000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.052000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.052000 audit[2345]: AVC avc: denied { confidentiality } for pid=2345 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:20.052000 audit[2345]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff5fd4328 a2=94 a3=83 items=0 ppid=2300 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.052000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:22:20.061000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.061000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.061000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.061000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.061000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.061000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.061000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.061000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.061000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.061000 audit: BPF prog-id=83 op=LOAD May 15 10:22:20.061000 audit[2362]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc158a318 a2=98 a3=ffffc158a308 items=0 ppid=2300 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.061000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 10:22:20.061000 audit: BPF prog-id=83 op=UNLOAD May 15 10:22:20.061000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.061000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.061000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.061000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.061000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.061000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.061000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.061000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.061000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.061000 audit: BPF prog-id=84 op=LOAD May 15 10:22:20.061000 audit[2362]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc158a1c8 a2=74 a3=95 items=0 ppid=2300 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.061000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 10:22:20.061000 audit: BPF prog-id=84 op=UNLOAD May 15 10:22:20.061000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.061000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.061000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.061000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.061000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.061000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.061000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.061000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.061000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.061000 audit: BPF prog-id=85 op=LOAD May 15 10:22:20.061000 audit[2362]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc158a1f8 a2=40 a3=ffffc158a228 items=0 ppid=2300 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.061000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 10:22:20.061000 audit: BPF prog-id=85 op=UNLOAD May 15 10:22:20.101384 systemd-networkd[1037]: vxlan.calico: Link UP May 15 10:22:20.101390 systemd-networkd[1037]: vxlan.calico: Gained carrier May 15 10:22:20.118000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.118000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.118000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.118000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.118000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.118000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.118000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.118000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.118000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.118000 audit: BPF prog-id=86 op=LOAD May 15 10:22:20.118000 audit[2392]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe3552c08 a2=98 a3=ffffe3552bf8 items=0 ppid=2300 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.118000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:22:20.118000 audit: BPF prog-id=86 op=UNLOAD May 15 10:22:20.118000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.118000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.118000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.118000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.118000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.118000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.118000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.118000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.118000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.118000 audit: BPF prog-id=87 op=LOAD May 15 10:22:20.118000 audit[2392]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe35528e8 a2=74 a3=95 items=0 ppid=2300 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.118000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:22:20.118000 audit: BPF prog-id=87 op=UNLOAD May 15 10:22:20.118000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.118000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.118000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.118000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.118000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.118000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.118000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.118000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.118000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.118000 audit: BPF prog-id=88 op=LOAD May 15 10:22:20.118000 audit[2392]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe3552948 a2=94 a3=2 items=0 ppid=2300 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.118000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:22:20.119000 audit: BPF prog-id=88 op=UNLOAD May 15 10:22:20.119000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.119000 audit[2392]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffe3552978 a2=28 a3=ffffe3552aa8 items=0 ppid=2300 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.119000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:22:20.119000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.119000 audit[2392]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe35529a8 a2=28 a3=ffffe3552ad8 items=0 ppid=2300 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.119000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:22:20.119000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.119000 audit[2392]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe3552858 a2=28 a3=ffffe3552988 items=0 ppid=2300 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.119000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:22:20.119000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.119000 audit[2392]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffe35529c8 a2=28 a3=ffffe3552af8 items=0 ppid=2300 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.119000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:22:20.119000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.119000 audit[2392]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffe35529a8 a2=28 a3=ffffe3552ad8 items=0 ppid=2300 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.119000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:22:20.119000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.119000 audit[2392]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffe3552998 a2=28 a3=ffffe3552ac8 items=0 ppid=2300 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.119000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:22:20.119000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.119000 audit[2392]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffe35529c8 a2=28 a3=ffffe3552af8 items=0 ppid=2300 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.119000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:22:20.119000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.119000 audit[2392]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe35529a8 a2=28 a3=ffffe3552ad8 items=0 ppid=2300 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.119000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:22:20.119000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.119000 audit[2392]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe35529c8 a2=28 a3=ffffe3552af8 items=0 ppid=2300 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.119000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:22:20.119000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.119000 audit[2392]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe3552998 a2=28 a3=ffffe3552ac8 items=0 ppid=2300 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.119000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:22:20.119000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.119000 audit[2392]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffe3552a18 a2=28 a3=ffffe3552b58 items=0 ppid=2300 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.119000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:22:20.119000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.119000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.119000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.119000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.119000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.119000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.119000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.119000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.119000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.119000 audit: BPF prog-id=89 op=LOAD May 15 10:22:20.119000 audit[2392]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffe3552838 a2=40 a3=ffffe3552868 items=0 ppid=2300 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.119000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:22:20.119000 audit: BPF prog-id=89 op=UNLOAD May 15 10:22:20.119000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.119000 audit[2392]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffe3552860 a2=50 a3=0 items=0 ppid=2300 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.119000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:22:20.119000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.119000 audit[2392]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=ffffe3552860 a2=50 a3=0 items=0 ppid=2300 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.119000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:22:20.119000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.119000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.119000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.119000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.119000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.119000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.119000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.119000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.119000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.119000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.119000 audit: BPF prog-id=90 op=LOAD May 15 10:22:20.119000 audit[2392]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffe3551fc8 a2=94 a3=2 items=0 ppid=2300 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.119000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:22:20.119000 audit: BPF prog-id=90 op=UNLOAD May 15 10:22:20.119000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.119000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.119000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.119000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.119000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.119000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.119000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.119000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.119000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.119000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.119000 audit: BPF prog-id=91 op=LOAD May 15 10:22:20.119000 audit[2392]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffe3552158 a2=94 a3=30 items=0 ppid=2300 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.119000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:22:20.126000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.126000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.126000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.126000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.126000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.126000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.126000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.126000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.126000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.126000 audit: BPF prog-id=92 op=LOAD May 15 10:22:20.126000 audit[2400]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff78b8b58 a2=98 a3=fffff78b8b48 items=0 ppid=2300 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.126000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:22:20.126000 audit: BPF prog-id=92 op=UNLOAD May 15 10:22:20.126000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.126000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.126000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.126000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.126000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.126000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.126000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.126000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.126000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.126000 audit: BPF prog-id=93 op=LOAD May 15 10:22:20.126000 audit[2400]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff78b87e8 a2=74 a3=95 items=0 ppid=2300 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.126000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:22:20.126000 audit: BPF prog-id=93 op=UNLOAD May 15 10:22:20.126000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.126000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.126000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.126000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.126000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.126000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.126000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.126000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.126000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.126000 audit: BPF prog-id=94 op=LOAD May 15 10:22:20.126000 audit[2400]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff78b8848 a2=94 a3=2 items=0 ppid=2300 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.126000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:22:20.126000 audit: BPF prog-id=94 op=UNLOAD May 15 10:22:20.211000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.211000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.211000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.211000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.211000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.211000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.211000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.211000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.211000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.211000 audit: BPF prog-id=95 op=LOAD May 15 10:22:20.211000 audit[2400]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff78b8808 a2=40 a3=fffff78b8838 items=0 ppid=2300 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.211000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:22:20.212000 audit: BPF prog-id=95 op=UNLOAD May 15 10:22:20.212000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.212000 audit[2400]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=fffff78b8920 a2=50 a3=0 items=0 ppid=2300 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.212000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:22:20.221000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.221000 audit[2400]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff78b8878 a2=28 a3=fffff78b89a8 items=0 ppid=2300 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.221000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:22:20.221000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.221000 audit[2400]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff78b88a8 a2=28 a3=fffff78b89d8 items=0 ppid=2300 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.221000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:22:20.221000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.221000 audit[2400]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff78b8758 a2=28 a3=fffff78b8888 items=0 ppid=2300 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.221000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:22:20.221000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.221000 audit[2400]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff78b88c8 a2=28 a3=fffff78b89f8 items=0 ppid=2300 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.221000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:22:20.221000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.221000 audit[2400]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff78b88a8 a2=28 a3=fffff78b89d8 items=0 ppid=2300 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.221000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:22:20.221000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.221000 audit[2400]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff78b8898 a2=28 a3=fffff78b89c8 items=0 ppid=2300 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.221000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:22:20.221000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.221000 audit[2400]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff78b88c8 a2=28 a3=fffff78b89f8 items=0 ppid=2300 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.221000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:22:20.221000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.221000 audit[2400]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff78b88a8 a2=28 a3=fffff78b89d8 items=0 ppid=2300 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.221000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:22:20.221000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.221000 audit[2400]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff78b88c8 a2=28 a3=fffff78b89f8 items=0 ppid=2300 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.221000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:22:20.221000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.221000 audit[2400]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff78b8898 a2=28 a3=fffff78b89c8 items=0 ppid=2300 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.221000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:22:20.221000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.221000 audit[2400]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff78b8918 a2=28 a3=fffff78b8a58 items=0 ppid=2300 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.221000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:22:20.221000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.221000 audit[2400]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffff78b8650 a2=50 a3=0 items=0 ppid=2300 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.221000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:22:20.221000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.221000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.221000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.221000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.221000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.221000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.221000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.221000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.221000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.221000 audit: BPF prog-id=96 op=LOAD May 15 10:22:20.221000 audit[2400]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffff78b8658 a2=94 a3=5 items=0 ppid=2300 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.221000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:22:20.221000 audit: BPF prog-id=96 op=UNLOAD May 15 10:22:20.221000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.221000 audit[2400]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffff78b8760 a2=50 a3=0 items=0 ppid=2300 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.221000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:22:20.221000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.221000 audit[2400]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=fffff78b88a8 a2=4 a3=3 items=0 ppid=2300 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.221000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:22:20.221000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.221000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.221000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.221000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.221000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.221000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.221000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.221000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.221000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.221000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.221000 audit[2400]: AVC avc: denied { confidentiality } for pid=2400 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:20.221000 audit[2400]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff78b8888 a2=94 a3=6 items=0 ppid=2300 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.221000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:22:20.222000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.222000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.222000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.222000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.222000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.222000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.222000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.222000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.222000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.222000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.222000 audit[2400]: AVC avc: denied { confidentiality } for pid=2400 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:20.222000 audit[2400]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff78b8058 a2=94 a3=83 items=0 ppid=2300 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.222000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:22:20.222000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.222000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.222000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.222000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.222000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.222000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.222000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.222000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.222000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.222000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.222000 audit[2400]: AVC avc: denied { confidentiality } for pid=2400 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:20.222000 audit[2400]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff78b8058 a2=94 a3=83 items=0 ppid=2300 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.222000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:22:20.222000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.222000 audit[2400]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff78b9a98 a2=10 a3=fffff78b9b88 items=0 ppid=2300 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.222000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:22:20.222000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.222000 audit[2400]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff78b9958 a2=10 a3=fffff78b9a48 items=0 ppid=2300 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.222000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:22:20.222000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.222000 audit[2400]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff78b98c8 a2=10 a3=fffff78b9a48 items=0 ppid=2300 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.222000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:22:20.222000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:20.222000 audit[2400]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff78b98c8 a2=10 a3=fffff78b9a48 items=0 ppid=2300 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.222000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:22:20.230000 audit: BPF prog-id=91 op=UNLOAD May 15 10:22:20.276000 audit[2422]: NETFILTER_CFG table=mangle:75 family=2 entries=16 op=nft_register_chain pid=2422 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:22:20.276000 audit[2422]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=fffffdc21310 a2=0 a3=ffffb3baffa8 items=0 ppid=2300 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.276000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:22:20.282000 audit[2425]: NETFILTER_CFG table=nat:76 family=2 entries=15 op=nft_register_chain pid=2425 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:22:20.282000 audit[2425]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffe6752a00 a2=0 a3=ffffafcdcfa8 items=0 ppid=2300 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.282000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:22:20.282000 audit[2420]: NETFILTER_CFG table=raw:77 family=2 entries=21 op=nft_register_chain pid=2420 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:22:20.282000 audit[2420]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=ffffe3251910 a2=0 a3=ffff85218fa8 items=0 ppid=2300 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.282000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:22:20.284000 audit[2421]: NETFILTER_CFG table=filter:78 family=2 entries=39 op=nft_register_chain pid=2421 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:22:20.284000 audit[2421]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=ffffd13b4c20 a2=0 a3=ffffab99cfa8 items=0 ppid=2300 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:20.284000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:22:20.547273 kubelet[1456]: E0515 10:22:20.547131 1456 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:20.560449 kubelet[1456]: E0515 10:22:20.560404 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:21.561007 kubelet[1456]: E0515 10:22:21.560957 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:22.011236 systemd-networkd[1037]: vxlan.calico: Gained IPv6LL May 15 10:22:22.561697 kubelet[1456]: E0515 10:22:22.561645 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:23.562472 kubelet[1456]: E0515 10:22:23.562415 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:24.562562 kubelet[1456]: E0515 10:22:24.562521 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:25.562799 kubelet[1456]: E0515 10:22:25.562753 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:25.731150 env[1207]: time="2025-05-15T10:22:25.730966383Z" level=info msg="StopPodSandbox for \"3642ce46ecde7919d90fd28880782820cff6560929c7c30444a4374851b901e0\"" May 15 10:22:25.731510 env[1207]: time="2025-05-15T10:22:25.731257227Z" level=info msg="StopPodSandbox for \"c3613fe0db21cc8269faf6382ab950b3e169f20b9b9e81ed1f8e164395dd74cb\"" May 15 10:22:25.878819 env[1207]: 2025-05-15 10:22:25.785 [INFO][2480] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3642ce46ecde7919d90fd28880782820cff6560929c7c30444a4374851b901e0" May 15 10:22:25.878819 env[1207]: 2025-05-15 10:22:25.785 [INFO][2480] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="3642ce46ecde7919d90fd28880782820cff6560929c7c30444a4374851b901e0" iface="eth0" netns="/var/run/netns/cni-5412003e-67f4-8087-fbe6-82caf1b1af6a" May 15 10:22:25.878819 env[1207]: 2025-05-15 10:22:25.785 [INFO][2480] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="3642ce46ecde7919d90fd28880782820cff6560929c7c30444a4374851b901e0" iface="eth0" netns="/var/run/netns/cni-5412003e-67f4-8087-fbe6-82caf1b1af6a" May 15 10:22:25.878819 env[1207]: 2025-05-15 10:22:25.785 [INFO][2480] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="3642ce46ecde7919d90fd28880782820cff6560929c7c30444a4374851b901e0" iface="eth0" netns="/var/run/netns/cni-5412003e-67f4-8087-fbe6-82caf1b1af6a" May 15 10:22:25.878819 env[1207]: 2025-05-15 10:22:25.785 [INFO][2480] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3642ce46ecde7919d90fd28880782820cff6560929c7c30444a4374851b901e0" May 15 10:22:25.878819 env[1207]: 2025-05-15 10:22:25.785 [INFO][2480] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3642ce46ecde7919d90fd28880782820cff6560929c7c30444a4374851b901e0" May 15 10:22:25.878819 env[1207]: 2025-05-15 10:22:25.863 [INFO][2500] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3642ce46ecde7919d90fd28880782820cff6560929c7c30444a4374851b901e0" HandleID="k8s-pod-network.3642ce46ecde7919d90fd28880782820cff6560929c7c30444a4374851b901e0" Workload="10.0.0.109-k8s-csi--node--driver--r2jpz-eth0" May 15 10:22:25.878819 env[1207]: 2025-05-15 10:22:25.863 [INFO][2500] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:22:25.878819 env[1207]: 2025-05-15 10:22:25.863 [INFO][2500] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:22:25.878819 env[1207]: 2025-05-15 10:22:25.874 [WARNING][2500] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3642ce46ecde7919d90fd28880782820cff6560929c7c30444a4374851b901e0" HandleID="k8s-pod-network.3642ce46ecde7919d90fd28880782820cff6560929c7c30444a4374851b901e0" Workload="10.0.0.109-k8s-csi--node--driver--r2jpz-eth0" May 15 10:22:25.878819 env[1207]: 2025-05-15 10:22:25.874 [INFO][2500] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3642ce46ecde7919d90fd28880782820cff6560929c7c30444a4374851b901e0" HandleID="k8s-pod-network.3642ce46ecde7919d90fd28880782820cff6560929c7c30444a4374851b901e0" Workload="10.0.0.109-k8s-csi--node--driver--r2jpz-eth0" May 15 10:22:25.878819 env[1207]: 2025-05-15 10:22:25.876 [INFO][2500] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:22:25.878819 env[1207]: 2025-05-15 10:22:25.877 [INFO][2480] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3642ce46ecde7919d90fd28880782820cff6560929c7c30444a4374851b901e0" May 15 10:22:25.880351 systemd[1]: run-netns-cni\x2d5412003e\x2d67f4\x2d8087\x2dfbe6\x2d82caf1b1af6a.mount: Deactivated successfully. May 15 10:22:25.881911 env[1207]: time="2025-05-15T10:22:25.881681145Z" level=info msg="TearDown network for sandbox \"3642ce46ecde7919d90fd28880782820cff6560929c7c30444a4374851b901e0\" successfully" May 15 10:22:25.881911 env[1207]: time="2025-05-15T10:22:25.881718716Z" level=info msg="StopPodSandbox for \"3642ce46ecde7919d90fd28880782820cff6560929c7c30444a4374851b901e0\" returns successfully" May 15 10:22:25.882555 env[1207]: time="2025-05-15T10:22:25.882517627Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-r2jpz,Uid:6a630004-415d-4244-b5b8-5916901b6ead,Namespace:calico-system,Attempt:1,}" May 15 10:22:25.896963 env[1207]: 2025-05-15 10:22:25.779 [INFO][2481] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c3613fe0db21cc8269faf6382ab950b3e169f20b9b9e81ed1f8e164395dd74cb" May 15 10:22:25.896963 env[1207]: 2025-05-15 10:22:25.780 [INFO][2481] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="c3613fe0db21cc8269faf6382ab950b3e169f20b9b9e81ed1f8e164395dd74cb" iface="eth0" netns="/var/run/netns/cni-d5b45b30-0a0f-6664-6a34-42e62b42756f" May 15 10:22:25.896963 env[1207]: 2025-05-15 10:22:25.780 [INFO][2481] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="c3613fe0db21cc8269faf6382ab950b3e169f20b9b9e81ed1f8e164395dd74cb" iface="eth0" netns="/var/run/netns/cni-d5b45b30-0a0f-6664-6a34-42e62b42756f" May 15 10:22:25.896963 env[1207]: 2025-05-15 10:22:25.780 [INFO][2481] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="c3613fe0db21cc8269faf6382ab950b3e169f20b9b9e81ed1f8e164395dd74cb" iface="eth0" netns="/var/run/netns/cni-d5b45b30-0a0f-6664-6a34-42e62b42756f" May 15 10:22:25.896963 env[1207]: 2025-05-15 10:22:25.780 [INFO][2481] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c3613fe0db21cc8269faf6382ab950b3e169f20b9b9e81ed1f8e164395dd74cb" May 15 10:22:25.896963 env[1207]: 2025-05-15 10:22:25.780 [INFO][2481] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c3613fe0db21cc8269faf6382ab950b3e169f20b9b9e81ed1f8e164395dd74cb" May 15 10:22:25.896963 env[1207]: 2025-05-15 10:22:25.869 [INFO][2498] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c3613fe0db21cc8269faf6382ab950b3e169f20b9b9e81ed1f8e164395dd74cb" HandleID="k8s-pod-network.c3613fe0db21cc8269faf6382ab950b3e169f20b9b9e81ed1f8e164395dd74cb" Workload="10.0.0.109-k8s-nginx--deployment--85f456d6dd--ncl8p-eth0" May 15 10:22:25.896963 env[1207]: 2025-05-15 10:22:25.871 [INFO][2498] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:22:25.896963 env[1207]: 2025-05-15 10:22:25.876 [INFO][2498] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:22:25.896963 env[1207]: 2025-05-15 10:22:25.890 [WARNING][2498] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c3613fe0db21cc8269faf6382ab950b3e169f20b9b9e81ed1f8e164395dd74cb" HandleID="k8s-pod-network.c3613fe0db21cc8269faf6382ab950b3e169f20b9b9e81ed1f8e164395dd74cb" Workload="10.0.0.109-k8s-nginx--deployment--85f456d6dd--ncl8p-eth0" May 15 10:22:25.896963 env[1207]: 2025-05-15 10:22:25.890 [INFO][2498] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c3613fe0db21cc8269faf6382ab950b3e169f20b9b9e81ed1f8e164395dd74cb" HandleID="k8s-pod-network.c3613fe0db21cc8269faf6382ab950b3e169f20b9b9e81ed1f8e164395dd74cb" Workload="10.0.0.109-k8s-nginx--deployment--85f456d6dd--ncl8p-eth0" May 15 10:22:25.896963 env[1207]: 2025-05-15 10:22:25.892 [INFO][2498] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:22:25.896963 env[1207]: 2025-05-15 10:22:25.895 [INFO][2481] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c3613fe0db21cc8269faf6382ab950b3e169f20b9b9e81ed1f8e164395dd74cb" May 15 10:22:25.899447 systemd[1]: run-netns-cni\x2dd5b45b30\x2d0a0f\x2d6664\x2d6a34\x2d42e62b42756f.mount: Deactivated successfully. May 15 10:22:25.901001 env[1207]: time="2025-05-15T10:22:25.900965044Z" level=info msg="TearDown network for sandbox \"c3613fe0db21cc8269faf6382ab950b3e169f20b9b9e81ed1f8e164395dd74cb\" successfully" May 15 10:22:25.901178 env[1207]: time="2025-05-15T10:22:25.901155819Z" level=info msg="StopPodSandbox for \"c3613fe0db21cc8269faf6382ab950b3e169f20b9b9e81ed1f8e164395dd74cb\" returns successfully" May 15 10:22:25.901922 env[1207]: time="2025-05-15T10:22:25.901894873Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-ncl8p,Uid:20867e5f-93ee-4143-bedd-3485d6ec59aa,Namespace:default,Attempt:1,}" May 15 10:22:26.033248 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 10:22:26.033355 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid7f581888b3: link becomes ready May 15 10:22:26.033252 systemd-networkd[1037]: calid7f581888b3: Link UP May 15 10:22:26.033470 systemd-networkd[1037]: calid7f581888b3: Gained carrier May 15 10:22:26.051862 env[1207]: 2025-05-15 10:22:25.943 [INFO][2514] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.109-k8s-csi--node--driver--r2jpz-eth0 csi-node-driver- calico-system 6a630004-415d-4244-b5b8-5916901b6ead 1012 0 2025-05-15 10:22:00 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b7b4b9d k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.0.0.109 csi-node-driver-r2jpz eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calid7f581888b3 [] []}} ContainerID="522588cb37b36baeb0dfe43f13487c77756d43b0d8408266735510d11f7410e0" Namespace="calico-system" Pod="csi-node-driver-r2jpz" WorkloadEndpoint="10.0.0.109-k8s-csi--node--driver--r2jpz-" May 15 10:22:26.051862 env[1207]: 2025-05-15 10:22:25.944 [INFO][2514] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="522588cb37b36baeb0dfe43f13487c77756d43b0d8408266735510d11f7410e0" Namespace="calico-system" Pod="csi-node-driver-r2jpz" WorkloadEndpoint="10.0.0.109-k8s-csi--node--driver--r2jpz-eth0" May 15 10:22:26.051862 env[1207]: 2025-05-15 10:22:25.975 [INFO][2544] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="522588cb37b36baeb0dfe43f13487c77756d43b0d8408266735510d11f7410e0" HandleID="k8s-pod-network.522588cb37b36baeb0dfe43f13487c77756d43b0d8408266735510d11f7410e0" Workload="10.0.0.109-k8s-csi--node--driver--r2jpz-eth0" May 15 10:22:26.051862 env[1207]: 2025-05-15 10:22:25.993 [INFO][2544] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="522588cb37b36baeb0dfe43f13487c77756d43b0d8408266735510d11f7410e0" HandleID="k8s-pod-network.522588cb37b36baeb0dfe43f13487c77756d43b0d8408266735510d11f7410e0" Workload="10.0.0.109-k8s-csi--node--driver--r2jpz-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40003750b0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.109", "pod":"csi-node-driver-r2jpz", "timestamp":"2025-05-15 10:22:25.975056679 +0000 UTC"}, Hostname:"10.0.0.109", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:22:26.051862 env[1207]: 2025-05-15 10:22:25.993 [INFO][2544] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:22:26.051862 env[1207]: 2025-05-15 10:22:25.993 [INFO][2544] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:22:26.051862 env[1207]: 2025-05-15 10:22:25.993 [INFO][2544] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.109' May 15 10:22:26.051862 env[1207]: 2025-05-15 10:22:25.995 [INFO][2544] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.522588cb37b36baeb0dfe43f13487c77756d43b0d8408266735510d11f7410e0" host="10.0.0.109" May 15 10:22:26.051862 env[1207]: 2025-05-15 10:22:26.004 [INFO][2544] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.109" May 15 10:22:26.051862 env[1207]: 2025-05-15 10:22:26.010 [INFO][2544] ipam/ipam.go 489: Trying affinity for 192.168.112.64/26 host="10.0.0.109" May 15 10:22:26.051862 env[1207]: 2025-05-15 10:22:26.012 [INFO][2544] ipam/ipam.go 155: Attempting to load block cidr=192.168.112.64/26 host="10.0.0.109" May 15 10:22:26.051862 env[1207]: 2025-05-15 10:22:26.015 [INFO][2544] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.112.64/26 host="10.0.0.109" May 15 10:22:26.051862 env[1207]: 2025-05-15 10:22:26.015 [INFO][2544] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.112.64/26 handle="k8s-pod-network.522588cb37b36baeb0dfe43f13487c77756d43b0d8408266735510d11f7410e0" host="10.0.0.109" May 15 10:22:26.051862 env[1207]: 2025-05-15 10:22:26.017 [INFO][2544] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.522588cb37b36baeb0dfe43f13487c77756d43b0d8408266735510d11f7410e0 May 15 10:22:26.051862 env[1207]: 2025-05-15 10:22:26.021 [INFO][2544] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.112.64/26 handle="k8s-pod-network.522588cb37b36baeb0dfe43f13487c77756d43b0d8408266735510d11f7410e0" host="10.0.0.109" May 15 10:22:26.051862 env[1207]: 2025-05-15 10:22:26.028 [INFO][2544] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.112.65/26] block=192.168.112.64/26 handle="k8s-pod-network.522588cb37b36baeb0dfe43f13487c77756d43b0d8408266735510d11f7410e0" host="10.0.0.109" May 15 10:22:26.051862 env[1207]: 2025-05-15 10:22:26.028 [INFO][2544] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.112.65/26] handle="k8s-pod-network.522588cb37b36baeb0dfe43f13487c77756d43b0d8408266735510d11f7410e0" host="10.0.0.109" May 15 10:22:26.051862 env[1207]: 2025-05-15 10:22:26.028 [INFO][2544] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:22:26.051862 env[1207]: 2025-05-15 10:22:26.028 [INFO][2544] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.112.65/26] IPv6=[] ContainerID="522588cb37b36baeb0dfe43f13487c77756d43b0d8408266735510d11f7410e0" HandleID="k8s-pod-network.522588cb37b36baeb0dfe43f13487c77756d43b0d8408266735510d11f7410e0" Workload="10.0.0.109-k8s-csi--node--driver--r2jpz-eth0" May 15 10:22:26.052447 env[1207]: 2025-05-15 10:22:26.029 [INFO][2514] cni-plugin/k8s.go 386: Populated endpoint ContainerID="522588cb37b36baeb0dfe43f13487c77756d43b0d8408266735510d11f7410e0" Namespace="calico-system" Pod="csi-node-driver-r2jpz" WorkloadEndpoint="10.0.0.109-k8s-csi--node--driver--r2jpz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.109-k8s-csi--node--driver--r2jpz-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"6a630004-415d-4244-b5b8-5916901b6ead", ResourceVersion:"1012", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 22, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.109", ContainerID:"", Pod:"csi-node-driver-r2jpz", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.112.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calid7f581888b3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:22:26.052447 env[1207]: 2025-05-15 10:22:26.030 [INFO][2514] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.112.65/32] ContainerID="522588cb37b36baeb0dfe43f13487c77756d43b0d8408266735510d11f7410e0" Namespace="calico-system" Pod="csi-node-driver-r2jpz" WorkloadEndpoint="10.0.0.109-k8s-csi--node--driver--r2jpz-eth0" May 15 10:22:26.052447 env[1207]: 2025-05-15 10:22:26.030 [INFO][2514] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calid7f581888b3 ContainerID="522588cb37b36baeb0dfe43f13487c77756d43b0d8408266735510d11f7410e0" Namespace="calico-system" Pod="csi-node-driver-r2jpz" WorkloadEndpoint="10.0.0.109-k8s-csi--node--driver--r2jpz-eth0" May 15 10:22:26.052447 env[1207]: 2025-05-15 10:22:26.033 [INFO][2514] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="522588cb37b36baeb0dfe43f13487c77756d43b0d8408266735510d11f7410e0" Namespace="calico-system" Pod="csi-node-driver-r2jpz" WorkloadEndpoint="10.0.0.109-k8s-csi--node--driver--r2jpz-eth0" May 15 10:22:26.052447 env[1207]: 2025-05-15 10:22:26.034 [INFO][2514] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="522588cb37b36baeb0dfe43f13487c77756d43b0d8408266735510d11f7410e0" Namespace="calico-system" Pod="csi-node-driver-r2jpz" WorkloadEndpoint="10.0.0.109-k8s-csi--node--driver--r2jpz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.109-k8s-csi--node--driver--r2jpz-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"6a630004-415d-4244-b5b8-5916901b6ead", ResourceVersion:"1012", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 22, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.109", ContainerID:"522588cb37b36baeb0dfe43f13487c77756d43b0d8408266735510d11f7410e0", Pod:"csi-node-driver-r2jpz", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.112.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calid7f581888b3", MAC:"52:d7:b7:39:32:88", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:22:26.052447 env[1207]: 2025-05-15 10:22:26.050 [INFO][2514] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="522588cb37b36baeb0dfe43f13487c77756d43b0d8408266735510d11f7410e0" Namespace="calico-system" Pod="csi-node-driver-r2jpz" WorkloadEndpoint="10.0.0.109-k8s-csi--node--driver--r2jpz-eth0" May 15 10:22:26.055145 kernel: kauditd_printk_skb: 476 callbacks suppressed May 15 10:22:26.055263 kernel: audit: type=1325 audit(1747304546.053:646): table=filter:79 family=2 entries=34 op=nft_register_chain pid=2566 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:22:26.053000 audit[2566]: NETFILTER_CFG table=filter:79 family=2 entries=34 op=nft_register_chain pid=2566 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:22:26.053000 audit[2566]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19148 a0=3 a1=fffffaf0e1d0 a2=0 a3=ffff86ea2fa8 items=0 ppid=2300 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:26.060424 kernel: audit: type=1300 audit(1747304546.053:646): arch=c00000b7 syscall=211 success=yes exit=19148 a0=3 a1=fffffaf0e1d0 a2=0 a3=ffff86ea2fa8 items=0 ppid=2300 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:26.060530 kernel: audit: type=1327 audit(1747304546.053:646): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:22:26.053000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:22:26.069019 env[1207]: time="2025-05-15T10:22:26.068927243Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:22:26.069019 env[1207]: time="2025-05-15T10:22:26.068970575Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:22:26.069019 env[1207]: time="2025-05-15T10:22:26.068981258Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:22:26.069243 env[1207]: time="2025-05-15T10:22:26.069145823Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/522588cb37b36baeb0dfe43f13487c77756d43b0d8408266735510d11f7410e0 pid=2585 runtime=io.containerd.runc.v2 May 15 10:22:26.073831 systemd-networkd[1037]: cali7f16a9323e3: Link UP May 15 10:22:26.075116 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7f16a9323e3: link becomes ready May 15 10:22:26.075203 systemd-networkd[1037]: cali7f16a9323e3: Gained carrier May 15 10:22:26.086667 systemd[1]: Started cri-containerd-522588cb37b36baeb0dfe43f13487c77756d43b0d8408266735510d11f7410e0.scope. May 15 10:22:26.103207 env[1207]: 2025-05-15 10:22:25.953 [INFO][2527] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.109-k8s-nginx--deployment--85f456d6dd--ncl8p-eth0 nginx-deployment-85f456d6dd- default 20867e5f-93ee-4143-bedd-3485d6ec59aa 1011 0 2025-05-15 10:22:12 +0000 UTC map[app:nginx pod-template-hash:85f456d6dd projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.109 nginx-deployment-85f456d6dd-ncl8p eth0 default [] [] [kns.default ksa.default.default] cali7f16a9323e3 [] []}} ContainerID="135937430c0faea2974ba897b27dd0e10fe502cdc51ffc38a92d0d19a868455d" Namespace="default" Pod="nginx-deployment-85f456d6dd-ncl8p" WorkloadEndpoint="10.0.0.109-k8s-nginx--deployment--85f456d6dd--ncl8p-" May 15 10:22:26.103207 env[1207]: 2025-05-15 10:22:25.953 [INFO][2527] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="135937430c0faea2974ba897b27dd0e10fe502cdc51ffc38a92d0d19a868455d" Namespace="default" Pod="nginx-deployment-85f456d6dd-ncl8p" WorkloadEndpoint="10.0.0.109-k8s-nginx--deployment--85f456d6dd--ncl8p-eth0" May 15 10:22:26.103207 env[1207]: 2025-05-15 10:22:25.984 [INFO][2551] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="135937430c0faea2974ba897b27dd0e10fe502cdc51ffc38a92d0d19a868455d" HandleID="k8s-pod-network.135937430c0faea2974ba897b27dd0e10fe502cdc51ffc38a92d0d19a868455d" Workload="10.0.0.109-k8s-nginx--deployment--85f456d6dd--ncl8p-eth0" May 15 10:22:26.103207 env[1207]: 2025-05-15 10:22:26.000 [INFO][2551] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="135937430c0faea2974ba897b27dd0e10fe502cdc51ffc38a92d0d19a868455d" HandleID="k8s-pod-network.135937430c0faea2974ba897b27dd0e10fe502cdc51ffc38a92d0d19a868455d" Workload="10.0.0.109-k8s-nginx--deployment--85f456d6dd--ncl8p-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400030b840), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.109", "pod":"nginx-deployment-85f456d6dd-ncl8p", "timestamp":"2025-05-15 10:22:25.984070367 +0000 UTC"}, Hostname:"10.0.0.109", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:22:26.103207 env[1207]: 2025-05-15 10:22:26.000 [INFO][2551] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:22:26.103207 env[1207]: 2025-05-15 10:22:26.028 [INFO][2551] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:22:26.103207 env[1207]: 2025-05-15 10:22:26.028 [INFO][2551] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.109' May 15 10:22:26.103207 env[1207]: 2025-05-15 10:22:26.034 [INFO][2551] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.135937430c0faea2974ba897b27dd0e10fe502cdc51ffc38a92d0d19a868455d" host="10.0.0.109" May 15 10:22:26.103207 env[1207]: 2025-05-15 10:22:26.039 [INFO][2551] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.109" May 15 10:22:26.103207 env[1207]: 2025-05-15 10:22:26.046 [INFO][2551] ipam/ipam.go 489: Trying affinity for 192.168.112.64/26 host="10.0.0.109" May 15 10:22:26.103207 env[1207]: 2025-05-15 10:22:26.051 [INFO][2551] ipam/ipam.go 155: Attempting to load block cidr=192.168.112.64/26 host="10.0.0.109" May 15 10:22:26.103207 env[1207]: 2025-05-15 10:22:26.055 [INFO][2551] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.112.64/26 host="10.0.0.109" May 15 10:22:26.103207 env[1207]: 2025-05-15 10:22:26.055 [INFO][2551] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.112.64/26 handle="k8s-pod-network.135937430c0faea2974ba897b27dd0e10fe502cdc51ffc38a92d0d19a868455d" host="10.0.0.109" May 15 10:22:26.103207 env[1207]: 2025-05-15 10:22:26.057 [INFO][2551] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.135937430c0faea2974ba897b27dd0e10fe502cdc51ffc38a92d0d19a868455d May 15 10:22:26.103207 env[1207]: 2025-05-15 10:22:26.063 [INFO][2551] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.112.64/26 handle="k8s-pod-network.135937430c0faea2974ba897b27dd0e10fe502cdc51ffc38a92d0d19a868455d" host="10.0.0.109" May 15 10:22:26.103207 env[1207]: 2025-05-15 10:22:26.069 [INFO][2551] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.112.66/26] block=192.168.112.64/26 handle="k8s-pod-network.135937430c0faea2974ba897b27dd0e10fe502cdc51ffc38a92d0d19a868455d" host="10.0.0.109" May 15 10:22:26.103207 env[1207]: 2025-05-15 10:22:26.069 [INFO][2551] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.112.66/26] handle="k8s-pod-network.135937430c0faea2974ba897b27dd0e10fe502cdc51ffc38a92d0d19a868455d" host="10.0.0.109" May 15 10:22:26.103207 env[1207]: 2025-05-15 10:22:26.069 [INFO][2551] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:22:26.103207 env[1207]: 2025-05-15 10:22:26.069 [INFO][2551] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.112.66/26] IPv6=[] ContainerID="135937430c0faea2974ba897b27dd0e10fe502cdc51ffc38a92d0d19a868455d" HandleID="k8s-pod-network.135937430c0faea2974ba897b27dd0e10fe502cdc51ffc38a92d0d19a868455d" Workload="10.0.0.109-k8s-nginx--deployment--85f456d6dd--ncl8p-eth0" May 15 10:22:26.103882 env[1207]: 2025-05-15 10:22:26.071 [INFO][2527] cni-plugin/k8s.go 386: Populated endpoint ContainerID="135937430c0faea2974ba897b27dd0e10fe502cdc51ffc38a92d0d19a868455d" Namespace="default" Pod="nginx-deployment-85f456d6dd-ncl8p" WorkloadEndpoint="10.0.0.109-k8s-nginx--deployment--85f456d6dd--ncl8p-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.109-k8s-nginx--deployment--85f456d6dd--ncl8p-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"20867e5f-93ee-4143-bedd-3485d6ec59aa", ResourceVersion:"1011", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 22, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.109", ContainerID:"", Pod:"nginx-deployment-85f456d6dd-ncl8p", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.112.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali7f16a9323e3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:22:26.103882 env[1207]: 2025-05-15 10:22:26.071 [INFO][2527] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.112.66/32] ContainerID="135937430c0faea2974ba897b27dd0e10fe502cdc51ffc38a92d0d19a868455d" Namespace="default" Pod="nginx-deployment-85f456d6dd-ncl8p" WorkloadEndpoint="10.0.0.109-k8s-nginx--deployment--85f456d6dd--ncl8p-eth0" May 15 10:22:26.103882 env[1207]: 2025-05-15 10:22:26.071 [INFO][2527] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali7f16a9323e3 ContainerID="135937430c0faea2974ba897b27dd0e10fe502cdc51ffc38a92d0d19a868455d" Namespace="default" Pod="nginx-deployment-85f456d6dd-ncl8p" WorkloadEndpoint="10.0.0.109-k8s-nginx--deployment--85f456d6dd--ncl8p-eth0" May 15 10:22:26.103882 env[1207]: 2025-05-15 10:22:26.075 [INFO][2527] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="135937430c0faea2974ba897b27dd0e10fe502cdc51ffc38a92d0d19a868455d" Namespace="default" Pod="nginx-deployment-85f456d6dd-ncl8p" WorkloadEndpoint="10.0.0.109-k8s-nginx--deployment--85f456d6dd--ncl8p-eth0" May 15 10:22:26.103882 env[1207]: 2025-05-15 10:22:26.080 [INFO][2527] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="135937430c0faea2974ba897b27dd0e10fe502cdc51ffc38a92d0d19a868455d" Namespace="default" Pod="nginx-deployment-85f456d6dd-ncl8p" WorkloadEndpoint="10.0.0.109-k8s-nginx--deployment--85f456d6dd--ncl8p-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.109-k8s-nginx--deployment--85f456d6dd--ncl8p-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"20867e5f-93ee-4143-bedd-3485d6ec59aa", ResourceVersion:"1011", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 22, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.109", ContainerID:"135937430c0faea2974ba897b27dd0e10fe502cdc51ffc38a92d0d19a868455d", Pod:"nginx-deployment-85f456d6dd-ncl8p", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.112.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali7f16a9323e3", MAC:"da:1c:f2:f5:e6:d3", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:22:26.103882 env[1207]: 2025-05-15 10:22:26.093 [INFO][2527] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="135937430c0faea2974ba897b27dd0e10fe502cdc51ffc38a92d0d19a868455d" Namespace="default" Pod="nginx-deployment-85f456d6dd-ncl8p" WorkloadEndpoint="10.0.0.109-k8s-nginx--deployment--85f456d6dd--ncl8p-eth0" May 15 10:22:26.103000 audit[2611]: NETFILTER_CFG table=filter:80 family=2 entries=38 op=nft_register_chain pid=2611 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:22:26.103000 audit[2611]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20312 a0=3 a1=fffff371f100 a2=0 a3=ffffbb200fa8 items=0 ppid=2300 pid=2611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:26.113177 kernel: audit: type=1325 audit(1747304546.103:647): table=filter:80 family=2 entries=38 op=nft_register_chain pid=2611 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:22:26.113247 kernel: audit: type=1300 audit(1747304546.103:647): arch=c00000b7 syscall=211 success=yes exit=20312 a0=3 a1=fffff371f100 a2=0 a3=ffffbb200fa8 items=0 ppid=2300 pid=2611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:26.113266 kernel: audit: type=1327 audit(1747304546.103:647): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:22:26.103000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:22:26.115662 env[1207]: time="2025-05-15T10:22:26.115574200Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:22:26.115662 env[1207]: time="2025-05-15T10:22:26.115627094Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:22:26.115662 env[1207]: time="2025-05-15T10:22:26.115638137Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:22:26.116069 env[1207]: time="2025-05-15T10:22:26.116040487Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/135937430c0faea2974ba897b27dd0e10fe502cdc51ffc38a92d0d19a868455d pid=2631 runtime=io.containerd.runc.v2 May 15 10:22:26.136712 systemd[1]: Started cri-containerd-135937430c0faea2974ba897b27dd0e10fe502cdc51ffc38a92d0d19a868455d.scope. May 15 10:22:26.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.162590 kernel: audit: type=1400 audit(1747304546.157:648): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.162670 kernel: audit: type=1400 audit(1747304546.157:649): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.162695 kernel: audit: type=1400 audit(1747304546.157:650): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.164382 kernel: audit: type=1400 audit(1747304546.157:651): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.159000 audit: BPF prog-id=97 op=LOAD May 15 10:22:26.163000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.163000 audit[2596]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2585 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:26.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532323538386362333762333662616562306466653433663133343837 May 15 10:22:26.163000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.163000 audit[2596]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2585 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:26.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532323538386362333762333662616562306466653433663133343837 May 15 10:22:26.163000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.163000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.163000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.163000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.163000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.163000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.163000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.163000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.163000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.163000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.163000 audit: BPF prog-id=98 op=LOAD May 15 10:22:26.165000 audit: BPF prog-id=99 op=LOAD May 15 10:22:26.163000 audit[2596]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2585 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:26.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532323538386362333762333662616562306466653433663133343837 May 15 10:22:26.165000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.165000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.165000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.165000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.165000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.165000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.165000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.165000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.165000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.165000 audit: BPF prog-id=100 op=LOAD May 15 10:22:26.165000 audit[2596]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2585 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:26.165000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532323538386362333762333662616562306466653433663133343837 May 15 10:22:26.165000 audit: BPF prog-id=100 op=UNLOAD May 15 10:22:26.165000 audit: BPF prog-id=98 op=UNLOAD May 15 10:22:26.165000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.165000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.165000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.165000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.165000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.165000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.165000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.165000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.165000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.165000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.165000 audit: BPF prog-id=101 op=LOAD May 15 10:22:26.165000 audit[2596]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2585 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:26.165000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532323538386362333762333662616562306466653433663133343837 May 15 10:22:26.165000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.165000 audit[2641]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2631 pid=2641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:26.165000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133353933373433306330666165613239373462613839376232376464 May 15 10:22:26.165000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.165000 audit[2641]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2631 pid=2641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:26.165000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133353933373433306330666165613239373462613839376232376464 May 15 10:22:26.165000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.165000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.165000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.165000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.165000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.165000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.165000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.165000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.165000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.165000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.165000 audit: BPF prog-id=102 op=LOAD May 15 10:22:26.165000 audit[2641]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2631 pid=2641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:26.165000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133353933373433306330666165613239373462613839376232376464 May 15 10:22:26.165000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.165000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.165000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.165000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.165000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.165000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.165000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.165000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.165000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.165000 audit: BPF prog-id=103 op=LOAD May 15 10:22:26.165000 audit[2641]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2631 pid=2641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:26.165000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133353933373433306330666165613239373462613839376232376464 May 15 10:22:26.165000 audit: BPF prog-id=103 op=UNLOAD May 15 10:22:26.165000 audit: BPF prog-id=102 op=UNLOAD May 15 10:22:26.165000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.165000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.165000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.165000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.165000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.165000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.165000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.165000 audit[2641]: AVC avc: denied { perfmon } for pid=2641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.165000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.165000 audit[2641]: AVC avc: denied { bpf } for pid=2641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:26.165000 audit: BPF prog-id=104 op=LOAD May 15 10:22:26.165000 audit[2641]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2631 pid=2641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:26.165000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133353933373433306330666165613239373462613839376232376464 May 15 10:22:26.166963 systemd-resolved[1149]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:22:26.167481 systemd-resolved[1149]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:22:26.182595 env[1207]: time="2025-05-15T10:22:26.182547876Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-r2jpz,Uid:6a630004-415d-4244-b5b8-5916901b6ead,Namespace:calico-system,Attempt:1,} returns sandbox id \"522588cb37b36baeb0dfe43f13487c77756d43b0d8408266735510d11f7410e0\"" May 15 10:22:26.184300 env[1207]: time="2025-05-15T10:22:26.184269547Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 15 10:22:26.189420 env[1207]: time="2025-05-15T10:22:26.189315247Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-ncl8p,Uid:20867e5f-93ee-4143-bedd-3485d6ec59aa,Namespace:default,Attempt:1,} returns sandbox id \"135937430c0faea2974ba897b27dd0e10fe502cdc51ffc38a92d0d19a868455d\"" May 15 10:22:26.563010 kubelet[1456]: E0515 10:22:26.562897 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:26.901000 audit[2678]: NETFILTER_CFG table=filter:81 family=2 entries=8 op=nft_register_rule pid=2678 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:22:26.901000 audit[2678]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=fffffeeabd90 a2=0 a3=1 items=0 ppid=1673 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:26.901000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:22:26.906000 audit[2678]: NETFILTER_CFG table=nat:82 family=2 entries=34 op=nft_register_chain pid=2678 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:22:26.906000 audit[2678]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=fffffeeabd90 a2=0 a3=1 items=0 ppid=1673 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:26.906000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:22:27.144392 env[1207]: time="2025-05-15T10:22:27.144331659Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:27.145694 env[1207]: time="2025-05-15T10:22:27.145645559Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:15faf29e8b518d846c91c15785ff89e783d356ea0f2b22826f47a556ea32645b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:27.147818 env[1207]: time="2025-05-15T10:22:27.147787673Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:27.149429 env[1207]: time="2025-05-15T10:22:27.149404411Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:27.150330 env[1207]: time="2025-05-15T10:22:27.150296001Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:15faf29e8b518d846c91c15785ff89e783d356ea0f2b22826f47a556ea32645b\"" May 15 10:22:27.152254 env[1207]: time="2025-05-15T10:22:27.152227541Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 15 10:22:27.153043 env[1207]: time="2025-05-15T10:22:27.153011904Z" level=info msg="CreateContainer within sandbox \"522588cb37b36baeb0dfe43f13487c77756d43b0d8408266735510d11f7410e0\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 15 10:22:27.164716 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount656610025.mount: Deactivated successfully. May 15 10:22:27.168600 env[1207]: time="2025-05-15T10:22:27.168544081Z" level=info msg="CreateContainer within sandbox \"522588cb37b36baeb0dfe43f13487c77756d43b0d8408266735510d11f7410e0\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"3668d8993f0a5d8179dadf19b984000b9e28e07e3b34689443992359c51464d7\"" May 15 10:22:27.169341 env[1207]: time="2025-05-15T10:22:27.169274630Z" level=info msg="StartContainer for \"3668d8993f0a5d8179dadf19b984000b9e28e07e3b34689443992359c51464d7\"" May 15 10:22:27.188257 systemd[1]: Started cri-containerd-3668d8993f0a5d8179dadf19b984000b9e28e07e3b34689443992359c51464d7.scope. May 15 10:22:27.218000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:27.218000 audit[2687]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2585 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:27.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336363864383939336630613564383137396461646631396239383430 May 15 10:22:27.218000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:27.218000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:27.218000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:27.218000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:27.218000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:27.218000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:27.218000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:27.218000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:27.218000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:27.218000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:27.218000 audit: BPF prog-id=105 op=LOAD May 15 10:22:27.218000 audit[2687]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2585 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:27.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336363864383939336630613564383137396461646631396239383430 May 15 10:22:27.218000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:27.218000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:27.218000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:27.218000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:27.218000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:27.218000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:27.218000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:27.218000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:27.218000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:27.218000 audit: BPF prog-id=106 op=LOAD May 15 10:22:27.218000 audit[2687]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2585 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:27.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336363864383939336630613564383137396461646631396239383430 May 15 10:22:27.219000 audit: BPF prog-id=106 op=UNLOAD May 15 10:22:27.219000 audit: BPF prog-id=105 op=UNLOAD May 15 10:22:27.219000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:27.219000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:27.219000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:27.219000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:27.219000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:27.219000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:27.219000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:27.219000 audit[2687]: AVC avc: denied { perfmon } for pid=2687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:27.219000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:27.219000 audit[2687]: AVC avc: denied { bpf } for pid=2687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:27.219000 audit: BPF prog-id=107 op=LOAD May 15 10:22:27.219000 audit[2687]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2585 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:27.219000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336363864383939336630613564383137396461646631396239383430 May 15 10:22:27.233116 env[1207]: time="2025-05-15T10:22:27.233057087Z" level=info msg="StartContainer for \"3668d8993f0a5d8179dadf19b984000b9e28e07e3b34689443992359c51464d7\" returns successfully" May 15 10:22:27.259722 systemd-networkd[1037]: calid7f581888b3: Gained IPv6LL May 15 10:22:27.323287 systemd-networkd[1037]: cali7f16a9323e3: Gained IPv6LL May 15 10:22:27.563492 kubelet[1456]: E0515 10:22:27.563362 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:28.564475 kubelet[1456]: E0515 10:22:28.564429 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:29.041156 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount887425743.mount: Deactivated successfully. May 15 10:22:29.564860 kubelet[1456]: E0515 10:22:29.564808 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:30.223425 env[1207]: time="2025-05-15T10:22:30.223369059Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:30.225578 env[1207]: time="2025-05-15T10:22:30.225548898Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e8b1cb61bd96acc3ff3c695318c9cc691213d532eee3731d038af92816fcb5f4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:30.227087 env[1207]: time="2025-05-15T10:22:30.227060229Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:30.229131 env[1207]: time="2025-05-15T10:22:30.229107639Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:30.229767 env[1207]: time="2025-05-15T10:22:30.229739217Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:e8b1cb61bd96acc3ff3c695318c9cc691213d532eee3731d038af92816fcb5f4\"" May 15 10:22:30.231703 env[1207]: time="2025-05-15T10:22:30.231620870Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 15 10:22:30.232219 env[1207]: time="2025-05-15T10:22:30.232192356Z" level=info msg="CreateContainer within sandbox \"135937430c0faea2974ba897b27dd0e10fe502cdc51ffc38a92d0d19a868455d\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" May 15 10:22:30.242528 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1464078802.mount: Deactivated successfully. May 15 10:22:30.246924 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1802671396.mount: Deactivated successfully. May 15 10:22:30.249597 env[1207]: time="2025-05-15T10:22:30.249548565Z" level=info msg="CreateContainer within sandbox \"135937430c0faea2974ba897b27dd0e10fe502cdc51ffc38a92d0d19a868455d\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"6d0d9cfdcde60434cf8770cf66350a545100a8e08244cf9330e5d564ea0e41cf\"" May 15 10:22:30.250267 env[1207]: time="2025-05-15T10:22:30.250239676Z" level=info msg="StartContainer for \"6d0d9cfdcde60434cf8770cf66350a545100a8e08244cf9330e5d564ea0e41cf\"" May 15 10:22:30.266344 systemd[1]: Started cri-containerd-6d0d9cfdcde60434cf8770cf66350a545100a8e08244cf9330e5d564ea0e41cf.scope. May 15 10:22:30.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:30.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:30.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:30.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:30.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:30.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:30.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:30.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:30.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:30.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:30.304000 audit: BPF prog-id=108 op=LOAD May 15 10:22:30.305000 audit[2723]: AVC avc: denied { bpf } for pid=2723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:30.305000 audit[2723]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2631 pid=2723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:30.305000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664306439636664636465363034333463663837373063663636333530 May 15 10:22:30.305000 audit[2723]: AVC avc: denied { perfmon } for pid=2723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:30.305000 audit[2723]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2631 pid=2723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:30.305000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664306439636664636465363034333463663837373063663636333530 May 15 10:22:30.305000 audit[2723]: AVC avc: denied { bpf } for pid=2723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:30.305000 audit[2723]: AVC avc: denied { bpf } for pid=2723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:30.305000 audit[2723]: AVC avc: denied { bpf } for pid=2723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:30.305000 audit[2723]: AVC avc: denied { perfmon } for pid=2723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:30.305000 audit[2723]: AVC avc: denied { perfmon } for pid=2723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:30.305000 audit[2723]: AVC avc: denied { perfmon } for pid=2723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:30.305000 audit[2723]: AVC avc: denied { perfmon } for pid=2723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:30.305000 audit[2723]: AVC avc: denied { perfmon } for pid=2723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:30.305000 audit[2723]: AVC avc: denied { bpf } for pid=2723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:30.305000 audit[2723]: AVC avc: denied { bpf } for pid=2723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:30.305000 audit: BPF prog-id=109 op=LOAD May 15 10:22:30.305000 audit[2723]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2631 pid=2723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:30.305000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664306439636664636465363034333463663837373063663636333530 May 15 10:22:30.305000 audit[2723]: AVC avc: denied { bpf } for pid=2723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:30.305000 audit[2723]: AVC avc: denied { bpf } for pid=2723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:30.305000 audit[2723]: AVC avc: denied { perfmon } for pid=2723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:30.305000 audit[2723]: AVC avc: denied { perfmon } for pid=2723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:30.305000 audit[2723]: AVC avc: denied { perfmon } for pid=2723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:30.305000 audit[2723]: AVC avc: denied { perfmon } for pid=2723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:30.305000 audit[2723]: AVC avc: denied { perfmon } for pid=2723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:30.305000 audit[2723]: AVC avc: denied { bpf } for pid=2723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:30.305000 audit[2723]: AVC avc: denied { bpf } for pid=2723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:30.305000 audit: BPF prog-id=110 op=LOAD May 15 10:22:30.305000 audit[2723]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2631 pid=2723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:30.305000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664306439636664636465363034333463663837373063663636333530 May 15 10:22:30.305000 audit: BPF prog-id=110 op=UNLOAD May 15 10:22:30.305000 audit: BPF prog-id=109 op=UNLOAD May 15 10:22:30.305000 audit[2723]: AVC avc: denied { bpf } for pid=2723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:30.305000 audit[2723]: AVC avc: denied { bpf } for pid=2723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:30.305000 audit[2723]: AVC avc: denied { bpf } for pid=2723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:30.305000 audit[2723]: AVC avc: denied { perfmon } for pid=2723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:30.305000 audit[2723]: AVC avc: denied { perfmon } for pid=2723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:30.305000 audit[2723]: AVC avc: denied { perfmon } for pid=2723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:30.305000 audit[2723]: AVC avc: denied { perfmon } for pid=2723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:30.305000 audit[2723]: AVC avc: denied { perfmon } for pid=2723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:30.305000 audit[2723]: AVC avc: denied { bpf } for pid=2723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:30.305000 audit[2723]: AVC avc: denied { bpf } for pid=2723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:30.305000 audit: BPF prog-id=111 op=LOAD May 15 10:22:30.305000 audit[2723]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2631 pid=2723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:30.305000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664306439636664636465363034333463663837373063663636333530 May 15 10:22:30.365573 env[1207]: time="2025-05-15T10:22:30.365506253Z" level=info msg="StartContainer for \"6d0d9cfdcde60434cf8770cf66350a545100a8e08244cf9330e5d564ea0e41cf\" returns successfully" May 15 10:22:30.566016 kubelet[1456]: E0515 10:22:30.565904 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:30.824084 kubelet[1456]: I0515 10:22:30.823990 1456 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-85f456d6dd-ncl8p" podStartSLOduration=14.783451747 podStartE2EDuration="18.823973751s" podCreationTimestamp="2025-05-15 10:22:12 +0000 UTC" firstStartedPulling="2025-05-15 10:22:26.190583633 +0000 UTC m=+28.072788021" lastFinishedPulling="2025-05-15 10:22:30.231105637 +0000 UTC m=+32.113310025" observedRunningTime="2025-05-15 10:22:30.823820157 +0000 UTC m=+32.706024545" watchObservedRunningTime="2025-05-15 10:22:30.823973751 +0000 UTC m=+32.706178139" May 15 10:22:31.361544 env[1207]: time="2025-05-15T10:22:31.361481144Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:31.363988 env[1207]: time="2025-05-15T10:22:31.363948577Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a91b1f00752edc175f270a01b33683fa80818734aa2274388785eaf3364315dc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:31.366285 env[1207]: time="2025-05-15T10:22:31.366256017Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:31.367779 env[1207]: time="2025-05-15T10:22:31.367716921Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:31.368411 env[1207]: time="2025-05-15T10:22:31.368360495Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:a91b1f00752edc175f270a01b33683fa80818734aa2274388785eaf3364315dc\"" May 15 10:22:31.371102 env[1207]: time="2025-05-15T10:22:31.371062217Z" level=info msg="CreateContainer within sandbox \"522588cb37b36baeb0dfe43f13487c77756d43b0d8408266735510d11f7410e0\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 15 10:22:31.384520 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3968224577.mount: Deactivated successfully. May 15 10:22:31.388658 env[1207]: time="2025-05-15T10:22:31.388596664Z" level=info msg="CreateContainer within sandbox \"522588cb37b36baeb0dfe43f13487c77756d43b0d8408266735510d11f7410e0\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"1d97dd64c47d53e9ead0e15e20e358730306ed8947728c7dcb72d95f4b83ed8c\"" May 15 10:22:31.389386 env[1207]: time="2025-05-15T10:22:31.389349021Z" level=info msg="StartContainer for \"1d97dd64c47d53e9ead0e15e20e358730306ed8947728c7dcb72d95f4b83ed8c\"" May 15 10:22:31.413294 systemd[1]: Started cri-containerd-1d97dd64c47d53e9ead0e15e20e358730306ed8947728c7dcb72d95f4b83ed8c.scope. May 15 10:22:31.443000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:31.446694 kernel: kauditd_printk_skb: 216 callbacks suppressed May 15 10:22:31.446767 kernel: audit: type=1400 audit(1747304551.443:710): avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:31.446797 kernel: audit: type=1300 audit(1747304551.443:710): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2585 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:31.443000 audit[2788]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2585 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:31.443000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164393764643634633437643533653965616430653135653230653335 May 15 10:22:31.451928 kernel: audit: type=1327 audit(1747304551.443:710): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164393764643634633437643533653965616430653135653230653335 May 15 10:22:31.451984 kernel: audit: type=1400 audit(1747304551.443:711): avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:31.443000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:31.453770 kernel: audit: type=1400 audit(1747304551.443:711): avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:31.443000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:31.443000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:31.458055 kernel: audit: type=1400 audit(1747304551.443:711): avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:31.458118 kernel: audit: type=1400 audit(1747304551.443:711): avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:31.443000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:31.443000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:31.462469 kernel: audit: type=1400 audit(1747304551.443:711): avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:31.443000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:31.473817 kernel: audit: type=1400 audit(1747304551.443:711): avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:31.473968 kernel: audit: type=1400 audit(1747304551.443:711): avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:31.443000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:31.443000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:31.443000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:31.443000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:31.443000 audit: BPF prog-id=112 op=LOAD May 15 10:22:31.443000 audit[2788]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2585 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:31.443000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164393764643634633437643533653965616430653135653230653335 May 15 10:22:31.443000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:31.443000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:31.443000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:31.443000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:31.443000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:31.443000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:31.443000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:31.443000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:31.443000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:31.443000 audit: BPF prog-id=113 op=LOAD May 15 10:22:31.443000 audit[2788]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2585 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:31.443000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164393764643634633437643533653965616430653135653230653335 May 15 10:22:31.445000 audit: BPF prog-id=113 op=UNLOAD May 15 10:22:31.445000 audit: BPF prog-id=112 op=UNLOAD May 15 10:22:31.445000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:31.445000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:31.445000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:31.445000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:31.445000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:31.445000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:31.445000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:31.445000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:31.445000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:31.445000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:31.445000 audit: BPF prog-id=114 op=LOAD May 15 10:22:31.445000 audit[2788]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2585 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:31.445000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164393764643634633437643533653965616430653135653230653335 May 15 10:22:31.522145 env[1207]: time="2025-05-15T10:22:31.521595528Z" level=info msg="StartContainer for \"1d97dd64c47d53e9ead0e15e20e358730306ed8947728c7dcb72d95f4b83ed8c\" returns successfully" May 15 10:22:31.566749 kubelet[1456]: E0515 10:22:31.566705 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:31.708905 kubelet[1456]: I0515 10:22:31.708805 1456 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 15 10:22:31.708905 kubelet[1456]: I0515 10:22:31.708836 1456 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 15 10:22:31.832559 kubelet[1456]: I0515 10:22:31.832493 1456 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-r2jpz" podStartSLOduration=26.646727707 podStartE2EDuration="31.83246731s" podCreationTimestamp="2025-05-15 10:22:00 +0000 UTC" firstStartedPulling="2025-05-15 10:22:26.183796697 +0000 UTC m=+28.066001085" lastFinishedPulling="2025-05-15 10:22:31.3695363 +0000 UTC m=+33.251740688" observedRunningTime="2025-05-15 10:22:31.832201335 +0000 UTC m=+33.714405683" watchObservedRunningTime="2025-05-15 10:22:31.83246731 +0000 UTC m=+33.714671698" May 15 10:22:32.240426 systemd[1]: run-containerd-runc-k8s.io-1d97dd64c47d53e9ead0e15e20e358730306ed8947728c7dcb72d95f4b83ed8c-runc.BIrndQ.mount: Deactivated successfully. May 15 10:22:32.567685 kubelet[1456]: E0515 10:22:32.567434 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:33.567806 kubelet[1456]: E0515 10:22:33.567763 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:34.569102 kubelet[1456]: E0515 10:22:34.569041 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:35.274000 audit[2819]: NETFILTER_CFG table=filter:83 family=2 entries=20 op=nft_register_rule pid=2819 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:22:35.274000 audit[2819]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffcdafae80 a2=0 a3=1 items=0 ppid=1673 pid=2819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:35.274000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:22:35.282000 audit[2819]: NETFILTER_CFG table=nat:84 family=2 entries=22 op=nft_register_rule pid=2819 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:22:35.282000 audit[2819]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffcdafae80 a2=0 a3=1 items=0 ppid=1673 pid=2819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:35.282000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:22:35.297000 audit[2821]: NETFILTER_CFG table=filter:85 family=2 entries=32 op=nft_register_rule pid=2821 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:22:35.297000 audit[2821]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffc8b951f0 a2=0 a3=1 items=0 ppid=1673 pid=2821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:35.297000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:22:35.308275 kubelet[1456]: I0515 10:22:35.308230 1456 topology_manager.go:215] "Topology Admit Handler" podUID="8acfdea3-fa9b-4026-9cd2-d885557b450e" podNamespace="default" podName="nfs-server-provisioner-0" May 15 10:22:35.310000 audit[2821]: NETFILTER_CFG table=nat:86 family=2 entries=22 op=nft_register_rule pid=2821 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:22:35.310000 audit[2821]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffc8b951f0 a2=0 a3=1 items=0 ppid=1673 pid=2821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:35.310000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:22:35.312914 systemd[1]: Created slice kubepods-besteffort-pod8acfdea3_fa9b_4026_9cd2_d885557b450e.slice. May 15 10:22:35.440982 kubelet[1456]: I0515 10:22:35.440938 1456 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/8acfdea3-fa9b-4026-9cd2-d885557b450e-data\") pod \"nfs-server-provisioner-0\" (UID: \"8acfdea3-fa9b-4026-9cd2-d885557b450e\") " pod="default/nfs-server-provisioner-0" May 15 10:22:35.440982 kubelet[1456]: I0515 10:22:35.440980 1456 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gdrnm\" (UniqueName: \"kubernetes.io/projected/8acfdea3-fa9b-4026-9cd2-d885557b450e-kube-api-access-gdrnm\") pod \"nfs-server-provisioner-0\" (UID: \"8acfdea3-fa9b-4026-9cd2-d885557b450e\") " pod="default/nfs-server-provisioner-0" May 15 10:22:35.570334 kubelet[1456]: E0515 10:22:35.569629 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:35.615559 env[1207]: time="2025-05-15T10:22:35.615504070Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:8acfdea3-fa9b-4026-9cd2-d885557b450e,Namespace:default,Attempt:0,}" May 15 10:22:35.737658 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 10:22:35.737821 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready May 15 10:22:35.737297 systemd-networkd[1037]: cali60e51b789ff: Link UP May 15 10:22:35.737662 systemd-networkd[1037]: cali60e51b789ff: Gained carrier May 15 10:22:35.755571 env[1207]: 2025-05-15 10:22:35.665 [INFO][2825] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.109-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 8acfdea3-fa9b-4026-9cd2-d885557b450e 1089 0 2025-05-15 10:22:35 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.0.0.109 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="6f7a56bfae0b5d500f1d354cd5dc15beff96cd864e6432e1031f0a870f7c334a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.109-k8s-nfs--server--provisioner--0-" May 15 10:22:35.755571 env[1207]: 2025-05-15 10:22:35.665 [INFO][2825] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="6f7a56bfae0b5d500f1d354cd5dc15beff96cd864e6432e1031f0a870f7c334a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.109-k8s-nfs--server--provisioner--0-eth0" May 15 10:22:35.755571 env[1207]: 2025-05-15 10:22:35.695 [INFO][2840] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6f7a56bfae0b5d500f1d354cd5dc15beff96cd864e6432e1031f0a870f7c334a" HandleID="k8s-pod-network.6f7a56bfae0b5d500f1d354cd5dc15beff96cd864e6432e1031f0a870f7c334a" Workload="10.0.0.109-k8s-nfs--server--provisioner--0-eth0" May 15 10:22:35.755571 env[1207]: 2025-05-15 10:22:35.708 [INFO][2840] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="6f7a56bfae0b5d500f1d354cd5dc15beff96cd864e6432e1031f0a870f7c334a" HandleID="k8s-pod-network.6f7a56bfae0b5d500f1d354cd5dc15beff96cd864e6432e1031f0a870f7c334a" Workload="10.0.0.109-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002db3b0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.109", "pod":"nfs-server-provisioner-0", "timestamp":"2025-05-15 10:22:35.695225214 +0000 UTC"}, Hostname:"10.0.0.109", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:22:35.755571 env[1207]: 2025-05-15 10:22:35.708 [INFO][2840] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:22:35.755571 env[1207]: 2025-05-15 10:22:35.708 [INFO][2840] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:22:35.755571 env[1207]: 2025-05-15 10:22:35.708 [INFO][2840] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.109' May 15 10:22:35.755571 env[1207]: 2025-05-15 10:22:35.709 [INFO][2840] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6f7a56bfae0b5d500f1d354cd5dc15beff96cd864e6432e1031f0a870f7c334a" host="10.0.0.109" May 15 10:22:35.755571 env[1207]: 2025-05-15 10:22:35.713 [INFO][2840] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.109" May 15 10:22:35.755571 env[1207]: 2025-05-15 10:22:35.717 [INFO][2840] ipam/ipam.go 489: Trying affinity for 192.168.112.64/26 host="10.0.0.109" May 15 10:22:35.755571 env[1207]: 2025-05-15 10:22:35.719 [INFO][2840] ipam/ipam.go 155: Attempting to load block cidr=192.168.112.64/26 host="10.0.0.109" May 15 10:22:35.755571 env[1207]: 2025-05-15 10:22:35.721 [INFO][2840] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.112.64/26 host="10.0.0.109" May 15 10:22:35.755571 env[1207]: 2025-05-15 10:22:35.721 [INFO][2840] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.112.64/26 handle="k8s-pod-network.6f7a56bfae0b5d500f1d354cd5dc15beff96cd864e6432e1031f0a870f7c334a" host="10.0.0.109" May 15 10:22:35.755571 env[1207]: 2025-05-15 10:22:35.722 [INFO][2840] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.6f7a56bfae0b5d500f1d354cd5dc15beff96cd864e6432e1031f0a870f7c334a May 15 10:22:35.755571 env[1207]: 2025-05-15 10:22:35.726 [INFO][2840] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.112.64/26 handle="k8s-pod-network.6f7a56bfae0b5d500f1d354cd5dc15beff96cd864e6432e1031f0a870f7c334a" host="10.0.0.109" May 15 10:22:35.755571 env[1207]: 2025-05-15 10:22:35.732 [INFO][2840] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.112.67/26] block=192.168.112.64/26 handle="k8s-pod-network.6f7a56bfae0b5d500f1d354cd5dc15beff96cd864e6432e1031f0a870f7c334a" host="10.0.0.109" May 15 10:22:35.755571 env[1207]: 2025-05-15 10:22:35.732 [INFO][2840] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.112.67/26] handle="k8s-pod-network.6f7a56bfae0b5d500f1d354cd5dc15beff96cd864e6432e1031f0a870f7c334a" host="10.0.0.109" May 15 10:22:35.755571 env[1207]: 2025-05-15 10:22:35.732 [INFO][2840] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:22:35.755571 env[1207]: 2025-05-15 10:22:35.733 [INFO][2840] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.112.67/26] IPv6=[] ContainerID="6f7a56bfae0b5d500f1d354cd5dc15beff96cd864e6432e1031f0a870f7c334a" HandleID="k8s-pod-network.6f7a56bfae0b5d500f1d354cd5dc15beff96cd864e6432e1031f0a870f7c334a" Workload="10.0.0.109-k8s-nfs--server--provisioner--0-eth0" May 15 10:22:35.756224 env[1207]: 2025-05-15 10:22:35.734 [INFO][2825] cni-plugin/k8s.go 386: Populated endpoint ContainerID="6f7a56bfae0b5d500f1d354cd5dc15beff96cd864e6432e1031f0a870f7c334a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.109-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.109-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"8acfdea3-fa9b-4026-9cd2-d885557b450e", ResourceVersion:"1089", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 22, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.109", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.112.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:22:35.756224 env[1207]: 2025-05-15 10:22:35.734 [INFO][2825] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.112.67/32] ContainerID="6f7a56bfae0b5d500f1d354cd5dc15beff96cd864e6432e1031f0a870f7c334a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.109-k8s-nfs--server--provisioner--0-eth0" May 15 10:22:35.756224 env[1207]: 2025-05-15 10:22:35.734 [INFO][2825] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="6f7a56bfae0b5d500f1d354cd5dc15beff96cd864e6432e1031f0a870f7c334a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.109-k8s-nfs--server--provisioner--0-eth0" May 15 10:22:35.756224 env[1207]: 2025-05-15 10:22:35.737 [INFO][2825] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="6f7a56bfae0b5d500f1d354cd5dc15beff96cd864e6432e1031f0a870f7c334a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.109-k8s-nfs--server--provisioner--0-eth0" May 15 10:22:35.756379 env[1207]: 2025-05-15 10:22:35.741 [INFO][2825] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="6f7a56bfae0b5d500f1d354cd5dc15beff96cd864e6432e1031f0a870f7c334a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.109-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.109-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"8acfdea3-fa9b-4026-9cd2-d885557b450e", ResourceVersion:"1089", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 22, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.109", ContainerID:"6f7a56bfae0b5d500f1d354cd5dc15beff96cd864e6432e1031f0a870f7c334a", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.112.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"3a:d0:5d:96:96:90", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:22:35.756379 env[1207]: 2025-05-15 10:22:35.753 [INFO][2825] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="6f7a56bfae0b5d500f1d354cd5dc15beff96cd864e6432e1031f0a870f7c334a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.109-k8s-nfs--server--provisioner--0-eth0" May 15 10:22:35.766000 audit[2869]: NETFILTER_CFG table=filter:87 family=2 entries=38 op=nft_register_chain pid=2869 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:22:35.766000 audit[2869]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19820 a0=3 a1=ffffd320cd50 a2=0 a3=ffff85b4cfa8 items=0 ppid=2300 pid=2869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:35.766000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:22:35.768189 env[1207]: time="2025-05-15T10:22:35.767875403Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:22:35.768189 env[1207]: time="2025-05-15T10:22:35.767959777Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:22:35.768189 env[1207]: time="2025-05-15T10:22:35.767988142Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:22:35.768406 env[1207]: time="2025-05-15T10:22:35.768363605Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6f7a56bfae0b5d500f1d354cd5dc15beff96cd864e6432e1031f0a870f7c334a pid=2870 runtime=io.containerd.runc.v2 May 15 10:22:35.781725 systemd[1]: Started cri-containerd-6f7a56bfae0b5d500f1d354cd5dc15beff96cd864e6432e1031f0a870f7c334a.scope. May 15 10:22:35.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:35.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:35.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:35.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:35.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:35.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:35.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:35.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:35.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:35.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:35.808000 audit: BPF prog-id=115 op=LOAD May 15 10:22:35.808000 audit[2880]: AVC avc: denied { bpf } for pid=2880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:35.808000 audit[2880]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2870 pid=2880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:35.808000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666376135366266616530623564353030663164333534636435646331 May 15 10:22:35.808000 audit[2880]: AVC avc: denied { perfmon } for pid=2880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:35.808000 audit[2880]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2870 pid=2880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:35.808000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666376135366266616530623564353030663164333534636435646331 May 15 10:22:35.808000 audit[2880]: AVC avc: denied { bpf } for pid=2880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:35.808000 audit[2880]: AVC avc: denied { bpf } for pid=2880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:35.808000 audit[2880]: AVC avc: denied { bpf } for pid=2880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:35.808000 audit[2880]: AVC avc: denied { perfmon } for pid=2880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:35.808000 audit[2880]: AVC avc: denied { perfmon } for pid=2880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:35.808000 audit[2880]: AVC avc: denied { perfmon } for pid=2880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:35.808000 audit[2880]: AVC avc: denied { perfmon } for pid=2880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:35.808000 audit[2880]: AVC avc: denied { perfmon } for pid=2880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:35.808000 audit[2880]: AVC avc: denied { bpf } for pid=2880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:35.808000 audit[2880]: AVC avc: denied { bpf } for pid=2880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:35.808000 audit: BPF prog-id=116 op=LOAD May 15 10:22:35.808000 audit[2880]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2870 pid=2880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:35.808000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666376135366266616530623564353030663164333534636435646331 May 15 10:22:35.809000 audit[2880]: AVC avc: denied { bpf } for pid=2880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:35.809000 audit[2880]: AVC avc: denied { bpf } for pid=2880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:35.809000 audit[2880]: AVC avc: denied { perfmon } for pid=2880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:35.809000 audit[2880]: AVC avc: denied { perfmon } for pid=2880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:35.809000 audit[2880]: AVC avc: denied { perfmon } for pid=2880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:35.809000 audit[2880]: AVC avc: denied { perfmon } for pid=2880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:35.809000 audit[2880]: AVC avc: denied { perfmon } for pid=2880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:35.809000 audit[2880]: AVC avc: denied { bpf } for pid=2880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:35.809000 audit[2880]: AVC avc: denied { bpf } for pid=2880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:35.809000 audit: BPF prog-id=117 op=LOAD May 15 10:22:35.809000 audit[2880]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2870 pid=2880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:35.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666376135366266616530623564353030663164333534636435646331 May 15 10:22:35.809000 audit: BPF prog-id=117 op=UNLOAD May 15 10:22:35.809000 audit: BPF prog-id=116 op=UNLOAD May 15 10:22:35.809000 audit[2880]: AVC avc: denied { bpf } for pid=2880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:35.809000 audit[2880]: AVC avc: denied { bpf } for pid=2880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:35.809000 audit[2880]: AVC avc: denied { bpf } for pid=2880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:35.809000 audit[2880]: AVC avc: denied { perfmon } for pid=2880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:35.809000 audit[2880]: AVC avc: denied { perfmon } for pid=2880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:35.809000 audit[2880]: AVC avc: denied { perfmon } for pid=2880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:35.809000 audit[2880]: AVC avc: denied { perfmon } for pid=2880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:35.809000 audit[2880]: AVC avc: denied { perfmon } for pid=2880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:35.809000 audit[2880]: AVC avc: denied { bpf } for pid=2880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:35.809000 audit[2880]: AVC avc: denied { bpf } for pid=2880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:35.809000 audit: BPF prog-id=118 op=LOAD May 15 10:22:35.809000 audit[2880]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2870 pid=2880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:35.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666376135366266616530623564353030663164333534636435646331 May 15 10:22:35.812428 systemd-resolved[1149]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:22:35.827449 env[1207]: time="2025-05-15T10:22:35.827400855Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:8acfdea3-fa9b-4026-9cd2-d885557b450e,Namespace:default,Attempt:0,} returns sandbox id \"6f7a56bfae0b5d500f1d354cd5dc15beff96cd864e6432e1031f0a870f7c334a\"" May 15 10:22:35.828820 env[1207]: time="2025-05-15T10:22:35.828787369Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" May 15 10:22:36.004142 update_engine[1199]: I0515 10:22:36.003782 1199 update_attempter.cc:509] Updating boot flags... May 15 10:22:36.571366 kubelet[1456]: E0515 10:22:36.571318 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:36.987361 systemd-networkd[1037]: cali60e51b789ff: Gained IPv6LL May 15 10:22:37.572239 kubelet[1456]: E0515 10:22:37.572192 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:38.069260 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount461752491.mount: Deactivated successfully. May 15 10:22:38.572607 kubelet[1456]: E0515 10:22:38.572556 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:38.828368 kubelet[1456]: E0515 10:22:38.828272 1456 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:22:39.573266 kubelet[1456]: E0515 10:22:39.573224 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:39.872023 env[1207]: time="2025-05-15T10:22:39.871899241Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:39.873321 env[1207]: time="2025-05-15T10:22:39.873286513Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:39.875161 env[1207]: time="2025-05-15T10:22:39.875133209Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:39.876612 env[1207]: time="2025-05-15T10:22:39.876575569Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:39.877484 env[1207]: time="2025-05-15T10:22:39.877451851Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685\"" May 15 10:22:39.880019 env[1207]: time="2025-05-15T10:22:39.879979041Z" level=info msg="CreateContainer within sandbox \"6f7a56bfae0b5d500f1d354cd5dc15beff96cd864e6432e1031f0a870f7c334a\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" May 15 10:22:39.889146 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4208578468.mount: Deactivated successfully. May 15 10:22:39.892306 env[1207]: time="2025-05-15T10:22:39.892254824Z" level=info msg="CreateContainer within sandbox \"6f7a56bfae0b5d500f1d354cd5dc15beff96cd864e6432e1031f0a870f7c334a\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"fcf86aac67d03f026fb1de67e9385939fabdf1e505b9fa0efbad1d31165bfda8\"" May 15 10:22:39.893002 env[1207]: time="2025-05-15T10:22:39.892963362Z" level=info msg="StartContainer for \"fcf86aac67d03f026fb1de67e9385939fabdf1e505b9fa0efbad1d31165bfda8\"" May 15 10:22:39.914145 systemd[1]: Started cri-containerd-fcf86aac67d03f026fb1de67e9385939fabdf1e505b9fa0efbad1d31165bfda8.scope. May 15 10:22:39.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:39.957177 kernel: kauditd_printk_skb: 105 callbacks suppressed May 15 10:22:39.957237 kernel: audit: type=1400 audit(1747304559.955:739): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:39.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:39.960697 kernel: audit: type=1400 audit(1747304559.955:740): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:39.960776 kernel: audit: type=1400 audit(1747304559.955:741): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:39.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:39.962424 kernel: audit: type=1400 audit(1747304559.955:742): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:39.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:39.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:39.965973 kernel: audit: type=1400 audit(1747304559.955:743): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:39.966034 kernel: audit: type=1400 audit(1747304559.955:744): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:39.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:39.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:39.969619 kernel: audit: type=1400 audit(1747304559.955:745): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:39.969698 kernel: audit: type=1400 audit(1747304559.955:746): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:39.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:39.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:39.973241 kernel: audit: type=1400 audit(1747304559.955:747): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:39.973295 kernel: audit: type=1400 audit(1747304559.956:748): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:39.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:39.956000 audit: BPF prog-id=119 op=LOAD May 15 10:22:39.962000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:39.962000 audit[2946]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=2870 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:39.962000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663663836616163363764303366303236666231646536376539333835 May 15 10:22:39.962000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:39.962000 audit[2946]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=2870 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:39.962000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663663836616163363764303366303236666231646536376539333835 May 15 10:22:39.962000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:39.962000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:39.962000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:39.962000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:39.962000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:39.962000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:39.962000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:39.962000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:39.962000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:39.962000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:39.962000 audit: BPF prog-id=120 op=LOAD May 15 10:22:39.962000 audit[2946]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=2870 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:39.962000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663663836616163363764303366303236666231646536376539333835 May 15 10:22:39.963000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:39.963000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:39.963000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:39.963000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:39.963000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:39.963000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:39.963000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:39.963000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:39.963000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:39.963000 audit: BPF prog-id=121 op=LOAD May 15 10:22:39.963000 audit[2946]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=2870 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:39.963000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663663836616163363764303366303236666231646536376539333835 May 15 10:22:39.965000 audit: BPF prog-id=121 op=UNLOAD May 15 10:22:39.965000 audit: BPF prog-id=120 op=UNLOAD May 15 10:22:39.965000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:39.965000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:39.965000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:39.965000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:39.965000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:39.965000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:39.965000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:39.965000 audit[2946]: AVC avc: denied { perfmon } for pid=2946 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:39.965000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:39.965000 audit[2946]: AVC avc: denied { bpf } for pid=2946 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:39.965000 audit: BPF prog-id=122 op=LOAD May 15 10:22:39.965000 audit[2946]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=2870 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:39.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663663836616163363764303366303236666231646536376539333835 May 15 10:22:40.067057 env[1207]: time="2025-05-15T10:22:40.066977027Z" level=info msg="StartContainer for \"fcf86aac67d03f026fb1de67e9385939fabdf1e505b9fa0efbad1d31165bfda8\" returns successfully" May 15 10:22:40.083000 audit[2976]: AVC avc: denied { search } for pid=2976 comm="rpcbind" name="crypto" dev="proc" ino=15326 scontext=system_u:system_r:svirt_lxc_net_t:s0:c481,c897 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 15 10:22:40.083000 audit[2976]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff9465f000 a2=0 a3=0 items=0 ppid=2957 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c481,c897 key=(null) May 15 10:22:40.083000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 May 15 10:22:40.127000 audit[2981]: AVC avc: denied { search } for pid=2981 comm="dbus-daemon" name="crypto" dev="proc" ino=15326 scontext=system_u:system_r:svirt_lxc_net_t:s0:c481,c897 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 15 10:22:40.127000 audit[2981]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff88bbf000 a2=0 a3=0 items=0 ppid=2957 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c481,c897 key=(null) May 15 10:22:40.127000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 15 10:22:40.140000 audit[2982]: AVC avc: denied { watch } for pid=2982 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=536417 scontext=system_u:system_r:svirt_lxc_net_t:s0:c481,c897 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c481,c897 tclass=dir permissive=0 May 15 10:22:40.140000 audit[2982]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=aaaadaef9080 a2=2c8 a3=aaaadaee4a60 items=0 ppid=2957 pid=2982 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c481,c897 key=(null) May 15 10:22:40.140000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 15 10:22:40.150000 audit[2983]: AVC avc: denied { read } for pid=2983 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=15348 scontext=system_u:system_r:svirt_lxc_net_t:s0:c481,c897 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 May 15 10:22:40.150000 audit[2983]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffff9c a1=ffffae75a570 a2=80000 a3=0 items=0 ppid=2957 pid=2983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c481,c897 key=(null) May 15 10:22:40.150000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 15 10:22:40.152000 audit[2983]: AVC avc: denied { search } for pid=2983 comm="ganesha.nfsd" name="crypto" dev="proc" ino=15326 scontext=system_u:system_r:svirt_lxc_net_t:s0:c481,c897 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 15 10:22:40.152000 audit[2983]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffadaef000 a2=0 a3=0 items=0 ppid=2957 pid=2983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c481,c897 key=(null) May 15 10:22:40.152000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 15 10:22:40.547418 kubelet[1456]: E0515 10:22:40.547289 1456 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:40.573763 kubelet[1456]: E0515 10:22:40.573731 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:40.873000 audit[3011]: NETFILTER_CFG table=filter:88 family=2 entries=20 op=nft_register_rule pid=3011 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:22:40.873000 audit[3011]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffe691a2e0 a2=0 a3=1 items=0 ppid=1673 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:40.873000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:22:40.886924 systemd[1]: run-containerd-runc-k8s.io-fcf86aac67d03f026fb1de67e9385939fabdf1e505b9fa0efbad1d31165bfda8-runc.HnHQET.mount: Deactivated successfully. May 15 10:22:40.887000 audit[3011]: NETFILTER_CFG table=nat:89 family=2 entries=106 op=nft_register_chain pid=3011 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:22:40.887000 audit[3011]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffe691a2e0 a2=0 a3=1 items=0 ppid=1673 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:40.887000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:22:41.573894 kubelet[1456]: E0515 10:22:41.573845 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:42.574878 kubelet[1456]: E0515 10:22:42.574838 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:43.575164 kubelet[1456]: E0515 10:22:43.575125 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:44.576140 kubelet[1456]: E0515 10:22:44.576081 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:45.577245 kubelet[1456]: E0515 10:22:45.577194 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:46.577349 kubelet[1456]: E0515 10:22:46.577304 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:47.577865 kubelet[1456]: E0515 10:22:47.577825 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:48.579066 kubelet[1456]: E0515 10:22:48.578988 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:49.579392 kubelet[1456]: E0515 10:22:49.579338 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:49.623932 kubelet[1456]: I0515 10:22:49.623855 1456 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=10.573817958 podStartE2EDuration="14.623838595s" podCreationTimestamp="2025-05-15 10:22:35 +0000 UTC" firstStartedPulling="2025-05-15 10:22:35.828548809 +0000 UTC m=+37.710753197" lastFinishedPulling="2025-05-15 10:22:39.878569446 +0000 UTC m=+41.760773834" observedRunningTime="2025-05-15 10:22:40.857159404 +0000 UTC m=+42.739363752" watchObservedRunningTime="2025-05-15 10:22:49.623838595 +0000 UTC m=+51.506042983" May 15 10:22:49.624223 kubelet[1456]: I0515 10:22:49.624191 1456 topology_manager.go:215] "Topology Admit Handler" podUID="aa5bcc36-4fd2-4dd5-9709-2d19a093ae46" podNamespace="default" podName="test-pod-1" May 15 10:22:49.628859 systemd[1]: Created slice kubepods-besteffort-podaa5bcc36_4fd2_4dd5_9709_2d19a093ae46.slice. May 15 10:22:49.818346 kubelet[1456]: I0515 10:22:49.818306 1456 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-3b9d176f-a63e-4d88-b106-0745e8f8745e\" (UniqueName: \"kubernetes.io/nfs/aa5bcc36-4fd2-4dd5-9709-2d19a093ae46-pvc-3b9d176f-a63e-4d88-b106-0745e8f8745e\") pod \"test-pod-1\" (UID: \"aa5bcc36-4fd2-4dd5-9709-2d19a093ae46\") " pod="default/test-pod-1" May 15 10:22:49.818560 kubelet[1456]: I0515 10:22:49.818542 1456 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7shmm\" (UniqueName: \"kubernetes.io/projected/aa5bcc36-4fd2-4dd5-9709-2d19a093ae46-kube-api-access-7shmm\") pod \"test-pod-1\" (UID: \"aa5bcc36-4fd2-4dd5-9709-2d19a093ae46\") " pod="default/test-pod-1" May 15 10:22:49.940000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:49.945393 kernel: Failed to create system directory netfs May 15 10:22:49.945468 kernel: kauditd_printk_skb: 68 callbacks suppressed May 15 10:22:49.945490 kernel: audit: type=1400 audit(1747304569.940:764): avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:49.945512 kernel: Failed to create system directory netfs May 15 10:22:49.945528 kernel: audit: type=1400 audit(1747304569.940:764): avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:49.940000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:49.948131 kernel: Failed to create system directory netfs May 15 10:22:49.948193 kernel: Failed to create system directory netfs May 15 10:22:49.940000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:49.954079 kernel: audit: type=1400 audit(1747304569.940:764): avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:49.954153 kernel: audit: type=1400 audit(1747304569.940:764): avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:49.940000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:49.957357 kernel: audit: type=1300 audit(1747304569.940:764): arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaafe2295e0 a1=12c14 a2=aaaadd5de028 a3=aaaafe21a010 items=0 ppid=653 pid=3019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:49.940000 audit[3019]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaafe2295e0 a1=12c14 a2=aaaadd5de028 a3=aaaafe21a010 items=0 ppid=653 pid=3019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:49.959126 kernel: audit: type=1327 audit(1747304569.940:764): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 15 10:22:49.940000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 15 10:22:49.953000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:49.953000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:49.965028 kernel: Failed to create system directory fscache May 15 10:22:49.965069 kernel: audit: type=1400 audit(1747304569.953:765): avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:49.965104 kernel: Failed to create system directory fscache May 15 10:22:49.965299 kernel: Failed to create system directory fscache May 15 10:22:49.965332 kernel: audit: type=1400 audit(1747304569.953:765): avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:49.965359 kernel: audit: type=1400 audit(1747304569.953:765): avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:49.953000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:49.972985 kernel: Failed to create system directory fscache May 15 10:22:49.973080 kernel: audit: type=1400 audit(1747304569.953:765): avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:49.953000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:49.975320 kernel: Failed to create system directory fscache May 15 10:22:49.953000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:49.953000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:49.976185 kernel: Failed to create system directory fscache May 15 10:22:49.953000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:49.953000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:49.953000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:49.980511 kernel: Failed to create system directory fscache May 15 10:22:49.980554 kernel: Failed to create system directory fscache May 15 10:22:49.980574 kernel: Failed to create system directory fscache May 15 10:22:49.980590 kernel: Failed to create system directory fscache May 15 10:22:49.953000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:49.953000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:49.981339 kernel: Failed to create system directory fscache May 15 10:22:49.981372 kernel: Failed to create system directory fscache May 15 10:22:49.953000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:49.953000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:49.982165 kernel: Failed to create system directory fscache May 15 10:22:49.982203 kernel: Failed to create system directory fscache May 15 10:22:49.953000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:49.986945 kernel: FS-Cache: Loaded May 15 10:22:49.953000 audit[3019]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaafe43c210 a1=4c344 a2=aaaadd5de028 a3=aaaafe21a010 items=0 ppid=653 pid=3019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:49.953000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.009132 kernel: Failed to create system directory sunrpc May 15 10:22:50.009187 kernel: Failed to create system directory sunrpc May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.010407 kernel: Failed to create system directory sunrpc May 15 10:22:50.010460 kernel: Failed to create system directory sunrpc May 15 10:22:50.010481 kernel: Failed to create system directory sunrpc May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.011250 kernel: Failed to create system directory sunrpc May 15 10:22:50.011296 kernel: Failed to create system directory sunrpc May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.012125 kernel: Failed to create system directory sunrpc May 15 10:22:50.012167 kernel: Failed to create system directory sunrpc May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.013349 kernel: Failed to create system directory sunrpc May 15 10:22:50.013395 kernel: Failed to create system directory sunrpc May 15 10:22:50.013416 kernel: Failed to create system directory sunrpc May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.014167 kernel: Failed to create system directory sunrpc May 15 10:22:50.014208 kernel: Failed to create system directory sunrpc May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.015410 kernel: Failed to create system directory sunrpc May 15 10:22:50.015455 kernel: Failed to create system directory sunrpc May 15 10:22:50.015475 kernel: Failed to create system directory sunrpc May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.016254 kernel: Failed to create system directory sunrpc May 15 10:22:50.016300 kernel: Failed to create system directory sunrpc May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.017498 kernel: Failed to create system directory sunrpc May 15 10:22:50.017585 kernel: Failed to create system directory sunrpc May 15 10:22:50.017608 kernel: Failed to create system directory sunrpc May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.018336 kernel: Failed to create system directory sunrpc May 15 10:22:50.018381 kernel: Failed to create system directory sunrpc May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.019152 kernel: Failed to create system directory sunrpc May 15 10:22:50.019195 kernel: Failed to create system directory sunrpc May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.020396 kernel: Failed to create system directory sunrpc May 15 10:22:50.020434 kernel: Failed to create system directory sunrpc May 15 10:22:50.020451 kernel: Failed to create system directory sunrpc May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.021237 kernel: Failed to create system directory sunrpc May 15 10:22:50.021278 kernel: Failed to create system directory sunrpc May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.022488 kernel: Failed to create system directory sunrpc May 15 10:22:50.022535 kernel: Failed to create system directory sunrpc May 15 10:22:50.022554 kernel: Failed to create system directory sunrpc May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.023326 kernel: Failed to create system directory sunrpc May 15 10:22:50.023369 kernel: Failed to create system directory sunrpc May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.024135 kernel: Failed to create system directory sunrpc May 15 10:22:50.024170 kernel: Failed to create system directory sunrpc May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.025384 kernel: Failed to create system directory sunrpc May 15 10:22:50.025413 kernel: Failed to create system directory sunrpc May 15 10:22:50.025440 kernel: Failed to create system directory sunrpc May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.026451 kernel: Failed to create system directory sunrpc May 15 10:22:50.026514 kernel: Failed to create system directory sunrpc May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.027470 kernel: Failed to create system directory sunrpc May 15 10:22:50.027507 kernel: Failed to create system directory sunrpc May 15 10:22:50.027524 kernel: Failed to create system directory sunrpc May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.028297 kernel: Failed to create system directory sunrpc May 15 10:22:50.028335 kernel: Failed to create system directory sunrpc May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.029108 kernel: Failed to create system directory sunrpc May 15 10:22:50.029141 kernel: Failed to create system directory sunrpc May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.031051 kernel: Failed to create system directory sunrpc May 15 10:22:50.031102 kernel: Failed to create system directory sunrpc May 15 10:22:50.031123 kernel: Failed to create system directory sunrpc May 15 10:22:50.031139 kernel: Failed to create system directory sunrpc May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.032573 kernel: Failed to create system directory sunrpc May 15 10:22:50.032635 kernel: Failed to create system directory sunrpc May 15 10:22:50.032653 kernel: Failed to create system directory sunrpc May 15 10:22:50.032666 kernel: Failed to create system directory sunrpc May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.033556 kernel: Failed to create system directory sunrpc May 15 10:22:50.033610 kernel: Failed to create system directory sunrpc May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.034128 kernel: Failed to create system directory sunrpc May 15 10:22:50.034167 kernel: Failed to create system directory sunrpc May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.035364 kernel: Failed to create system directory sunrpc May 15 10:22:50.035408 kernel: Failed to create system directory sunrpc May 15 10:22:50.035427 kernel: Failed to create system directory sunrpc May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.036175 kernel: Failed to create system directory sunrpc May 15 10:22:50.036217 kernel: Failed to create system directory sunrpc May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.037420 kernel: Failed to create system directory sunrpc May 15 10:22:50.037462 kernel: Failed to create system directory sunrpc May 15 10:22:50.037483 kernel: Failed to create system directory sunrpc May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.038248 kernel: Failed to create system directory sunrpc May 15 10:22:50.038289 kernel: Failed to create system directory sunrpc May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.039477 kernel: Failed to create system directory sunrpc May 15 10:22:50.039517 kernel: Failed to create system directory sunrpc May 15 10:22:50.039535 kernel: Failed to create system directory sunrpc May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.040329 kernel: Failed to create system directory sunrpc May 15 10:22:50.040387 kernel: Failed to create system directory sunrpc May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.041210 kernel: Failed to create system directory sunrpc May 15 10:22:50.041255 kernel: Failed to create system directory sunrpc May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.042475 kernel: Failed to create system directory sunrpc May 15 10:22:50.042513 kernel: Failed to create system directory sunrpc May 15 10:22:50.042530 kernel: Failed to create system directory sunrpc May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.043326 kernel: Failed to create system directory sunrpc May 15 10:22:50.043353 kernel: Failed to create system directory sunrpc May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.044171 kernel: Failed to create system directory sunrpc May 15 10:22:50.044198 kernel: Failed to create system directory sunrpc May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.045439 kernel: Failed to create system directory sunrpc May 15 10:22:50.045474 kernel: Failed to create system directory sunrpc May 15 10:22:50.045488 kernel: Failed to create system directory sunrpc May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.046295 kernel: Failed to create system directory sunrpc May 15 10:22:50.046327 kernel: Failed to create system directory sunrpc May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.047156 kernel: Failed to create system directory sunrpc May 15 10:22:50.047210 kernel: Failed to create system directory sunrpc May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.048415 kernel: Failed to create system directory sunrpc May 15 10:22:50.048445 kernel: Failed to create system directory sunrpc May 15 10:22:50.048468 kernel: Failed to create system directory sunrpc May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.049262 kernel: Failed to create system directory sunrpc May 15 10:22:50.049290 kernel: Failed to create system directory sunrpc May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.050116 kernel: Failed to create system directory sunrpc May 15 10:22:50.050159 kernel: Failed to create system directory sunrpc May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.051415 kernel: Failed to create system directory sunrpc May 15 10:22:50.051451 kernel: Failed to create system directory sunrpc May 15 10:22:50.051472 kernel: Failed to create system directory sunrpc May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.052267 kernel: Failed to create system directory sunrpc May 15 10:22:50.052297 kernel: Failed to create system directory sunrpc May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.053104 kernel: Failed to create system directory sunrpc May 15 10:22:50.053140 kernel: Failed to create system directory sunrpc May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.054390 kernel: Failed to create system directory sunrpc May 15 10:22:50.054440 kernel: Failed to create system directory sunrpc May 15 10:22:50.054455 kernel: Failed to create system directory sunrpc May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.055354 kernel: Failed to create system directory sunrpc May 15 10:22:50.055402 kernel: Failed to create system directory sunrpc May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.056517 kernel: Failed to create system directory sunrpc May 15 10:22:50.056555 kernel: Failed to create system directory sunrpc May 15 10:22:50.056580 kernel: Failed to create system directory sunrpc May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.057365 kernel: Failed to create system directory sunrpc May 15 10:22:50.057448 kernel: Failed to create system directory sunrpc May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.058206 kernel: Failed to create system directory sunrpc May 15 10:22:50.058254 kernel: Failed to create system directory sunrpc May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.059511 kernel: Failed to create system directory sunrpc May 15 10:22:50.059542 kernel: Failed to create system directory sunrpc May 15 10:22:50.059557 kernel: Failed to create system directory sunrpc May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.060454 kernel: Failed to create system directory sunrpc May 15 10:22:50.060502 kernel: Failed to create system directory sunrpc May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.062754 kernel: Failed to create system directory sunrpc May 15 10:22:50.062894 kernel: Failed to create system directory sunrpc May 15 10:22:50.001000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.075798 kernel: RPC: Registered named UNIX socket transport module. May 15 10:22:50.075887 kernel: RPC: Registered udp transport module. May 15 10:22:50.075914 kernel: RPC: Registered tcp transport module. May 15 10:22:50.075934 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. May 15 10:22:50.001000 audit[3019]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaafe488560 a1=14a72c a2=aaaadd5de028 a3=aaaafe21a010 items=6 ppid=653 pid=3019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:50.001000 audit: CWD cwd="/" May 15 10:22:50.001000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:22:50.001000 audit: PATH item=1 name=(null) inode=16354 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:22:50.001000 audit: PATH item=2 name=(null) inode=16354 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:22:50.001000 audit: PATH item=3 name=(null) inode=16355 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:22:50.001000 audit: PATH item=4 name=(null) inode=16354 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:22:50.001000 audit: PATH item=5 name=(null) inode=16356 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:22:50.001000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.102256 kernel: Failed to create system directory nfs May 15 10:22:50.102306 kernel: Failed to create system directory nfs May 15 10:22:50.102324 kernel: Failed to create system directory nfs May 15 10:22:50.102339 kernel: Failed to create system directory nfs May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.103104 kernel: Failed to create system directory nfs May 15 10:22:50.103145 kernel: Failed to create system directory nfs May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.104303 kernel: Failed to create system directory nfs May 15 10:22:50.104340 kernel: Failed to create system directory nfs May 15 10:22:50.104359 kernel: Failed to create system directory nfs May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.105104 kernel: Failed to create system directory nfs May 15 10:22:50.105137 kernel: Failed to create system directory nfs May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.106318 kernel: Failed to create system directory nfs May 15 10:22:50.106353 kernel: Failed to create system directory nfs May 15 10:22:50.106375 kernel: Failed to create system directory nfs May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.107121 kernel: Failed to create system directory nfs May 15 10:22:50.107155 kernel: Failed to create system directory nfs May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.108405 kernel: Failed to create system directory nfs May 15 10:22:50.108454 kernel: Failed to create system directory nfs May 15 10:22:50.108473 kernel: Failed to create system directory nfs May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.109186 kernel: Failed to create system directory nfs May 15 10:22:50.109225 kernel: Failed to create system directory nfs May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.110460 kernel: Failed to create system directory nfs May 15 10:22:50.110491 kernel: Failed to create system directory nfs May 15 10:22:50.110512 kernel: Failed to create system directory nfs May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.111301 kernel: Failed to create system directory nfs May 15 10:22:50.111342 kernel: Failed to create system directory nfs May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.112178 kernel: Failed to create system directory nfs May 15 10:22:50.112219 kernel: Failed to create system directory nfs May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.113408 kernel: Failed to create system directory nfs May 15 10:22:50.113437 kernel: Failed to create system directory nfs May 15 10:22:50.113458 kernel: Failed to create system directory nfs May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.114209 kernel: Failed to create system directory nfs May 15 10:22:50.114245 kernel: Failed to create system directory nfs May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.115422 kernel: Failed to create system directory nfs May 15 10:22:50.115462 kernel: Failed to create system directory nfs May 15 10:22:50.115485 kernel: Failed to create system directory nfs May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.116228 kernel: Failed to create system directory nfs May 15 10:22:50.116279 kernel: Failed to create system directory nfs May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.117802 kernel: Failed to create system directory nfs May 15 10:22:50.117863 kernel: Failed to create system directory nfs May 15 10:22:50.117899 kernel: Failed to create system directory nfs May 15 10:22:50.117920 kernel: Failed to create system directory nfs May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.118364 kernel: Failed to create system directory nfs May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.119210 kernel: Failed to create system directory nfs May 15 10:22:50.119256 kernel: Failed to create system directory nfs May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.120459 kernel: Failed to create system directory nfs May 15 10:22:50.120532 kernel: Failed to create system directory nfs May 15 10:22:50.120563 kernel: Failed to create system directory nfs May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.121262 kernel: Failed to create system directory nfs May 15 10:22:50.121297 kernel: Failed to create system directory nfs May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.122099 kernel: Failed to create system directory nfs May 15 10:22:50.122146 kernel: Failed to create system directory nfs May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.123346 kernel: Failed to create system directory nfs May 15 10:22:50.123382 kernel: Failed to create system directory nfs May 15 10:22:50.123414 kernel: Failed to create system directory nfs May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.124114 kernel: Failed to create system directory nfs May 15 10:22:50.124178 kernel: Failed to create system directory nfs May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.125401 kernel: Failed to create system directory nfs May 15 10:22:50.125441 kernel: Failed to create system directory nfs May 15 10:22:50.125460 kernel: Failed to create system directory nfs May 15 10:22:50.095000 audit[3019]: AVC avc: denied { confidentiality } for pid=3019 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.142179 kernel: FS-Cache: Netfs 'nfs' registered for caching May 15 10:22:50.095000 audit[3019]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaafe6319f0 a1=1162dc a2=aaaadd5de028 a3=aaaafe21a010 items=0 ppid=653 pid=3019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:50.095000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.173147 kernel: Failed to create system directory nfs4 May 15 10:22:50.173240 kernel: Failed to create system directory nfs4 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.174322 kernel: Failed to create system directory nfs4 May 15 10:22:50.174394 kernel: Failed to create system directory nfs4 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.175885 kernel: Failed to create system directory nfs4 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.177183 kernel: Failed to create system directory nfs4 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.178237 kernel: Failed to create system directory nfs4 May 15 10:22:50.178276 kernel: Failed to create system directory nfs4 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.179285 kernel: Failed to create system directory nfs4 May 15 10:22:50.179324 kernel: Failed to create system directory nfs4 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.180403 kernel: Failed to create system directory nfs4 May 15 10:22:50.180441 kernel: Failed to create system directory nfs4 May 15 10:22:50.180469 kernel: Failed to create system directory nfs4 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.181366 kernel: Failed to create system directory nfs4 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.182287 kernel: Failed to create system directory nfs4 May 15 10:22:50.182316 kernel: Failed to create system directory nfs4 May 15 10:22:50.182331 kernel: Failed to create system directory nfs4 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.183193 kernel: Failed to create system directory nfs4 May 15 10:22:50.183219 kernel: Failed to create system directory nfs4 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.184104 kernel: Failed to create system directory nfs4 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.185455 kernel: Failed to create system directory nfs4 May 15 10:22:50.185480 kernel: Failed to create system directory nfs4 May 15 10:22:50.185505 kernel: Failed to create system directory nfs4 May 15 10:22:50.185522 kernel: Failed to create system directory nfs4 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.186358 kernel: Failed to create system directory nfs4 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.187281 kernel: Failed to create system directory nfs4 May 15 10:22:50.187307 kernel: Failed to create system directory nfs4 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.188214 kernel: Failed to create system directory nfs4 May 15 10:22:50.188246 kernel: Failed to create system directory nfs4 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.189136 kernel: Failed to create system directory nfs4 May 15 10:22:50.189177 kernel: Failed to create system directory nfs4 May 15 10:22:50.189193 kernel: Failed to create system directory nfs4 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.190123 kernel: Failed to create system directory nfs4 May 15 10:22:50.190151 kernel: Failed to create system directory nfs4 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.191433 kernel: Failed to create system directory nfs4 May 15 10:22:50.191467 kernel: Failed to create system directory nfs4 May 15 10:22:50.191482 kernel: Failed to create system directory nfs4 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.192348 kernel: Failed to create system directory nfs4 May 15 10:22:50.192382 kernel: Failed to create system directory nfs4 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.193205 kernel: Failed to create system directory nfs4 May 15 10:22:50.193239 kernel: Failed to create system directory nfs4 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.194475 kernel: Failed to create system directory nfs4 May 15 10:22:50.194498 kernel: Failed to create system directory nfs4 May 15 10:22:50.194512 kernel: Failed to create system directory nfs4 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.195326 kernel: Failed to create system directory nfs4 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.196215 kernel: Failed to create system directory nfs4 May 15 10:22:50.196234 kernel: Failed to create system directory nfs4 May 15 10:22:50.196255 kernel: Failed to create system directory nfs4 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.197678 kernel: Failed to create system directory nfs4 May 15 10:22:50.197744 kernel: Failed to create system directory nfs4 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.199582 kernel: Failed to create system directory nfs4 May 15 10:22:50.199618 kernel: Failed to create system directory nfs4 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.201987 kernel: Failed to create system directory nfs4 May 15 10:22:50.202012 kernel: Failed to create system directory nfs4 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.203524 kernel: Failed to create system directory nfs4 May 15 10:22:50.203598 kernel: Failed to create system directory nfs4 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.204628 kernel: Failed to create system directory nfs4 May 15 10:22:50.204701 kernel: Failed to create system directory nfs4 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.206301 kernel: Failed to create system directory nfs4 May 15 10:22:50.206328 kernel: Failed to create system directory nfs4 May 15 10:22:50.206365 kernel: Failed to create system directory nfs4 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.207355 kernel: Failed to create system directory nfs4 May 15 10:22:50.207379 kernel: Failed to create system directory nfs4 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.208234 kernel: Failed to create system directory nfs4 May 15 10:22:50.208259 kernel: Failed to create system directory nfs4 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.209569 kernel: Failed to create system directory nfs4 May 15 10:22:50.209595 kernel: Failed to create system directory nfs4 May 15 10:22:50.209640 kernel: Failed to create system directory nfs4 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.210396 kernel: Failed to create system directory nfs4 May 15 10:22:50.210453 kernel: Failed to create system directory nfs4 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.211274 kernel: Failed to create system directory nfs4 May 15 10:22:50.211319 kernel: Failed to create system directory nfs4 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.212195 kernel: Failed to create system directory nfs4 May 15 10:22:50.212248 kernel: Failed to create system directory nfs4 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.213401 kernel: Failed to create system directory nfs4 May 15 10:22:50.213478 kernel: Failed to create system directory nfs4 May 15 10:22:50.213513 kernel: Failed to create system directory nfs4 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.214237 kernel: Failed to create system directory nfs4 May 15 10:22:50.214298 kernel: Failed to create system directory nfs4 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.215534 kernel: Failed to create system directory nfs4 May 15 10:22:50.215567 kernel: Failed to create system directory nfs4 May 15 10:22:50.215604 kernel: Failed to create system directory nfs4 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.216328 kernel: Failed to create system directory nfs4 May 15 10:22:50.216387 kernel: Failed to create system directory nfs4 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.217174 kernel: Failed to create system directory nfs4 May 15 10:22:50.217226 kernel: Failed to create system directory nfs4 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.218491 kernel: Failed to create system directory nfs4 May 15 10:22:50.218532 kernel: Failed to create system directory nfs4 May 15 10:22:50.218562 kernel: Failed to create system directory nfs4 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.219333 kernel: Failed to create system directory nfs4 May 15 10:22:50.219383 kernel: Failed to create system directory nfs4 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.220188 kernel: Failed to create system directory nfs4 May 15 10:22:50.220226 kernel: Failed to create system directory nfs4 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.163000 audit[3024]: AVC avc: denied { confidentiality } for pid=3024 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.221099 kernel: Failed to create system directory nfs4 May 15 10:22:50.323482 kernel: NFS: Registering the id_resolver key type May 15 10:22:50.323600 kernel: Key type id_resolver registered May 15 10:22:50.323642 kernel: Key type id_legacy registered May 15 10:22:50.163000 audit[3024]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff90dea010 a1=19c694 a2=aaaad253e028 a3=aaaaed093010 items=0 ppid=653 pid=3024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:50.163000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 May 15 10:22:50.329000 audit[3025]: AVC avc: denied { confidentiality } for pid=3025 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.329000 audit[3025]: AVC avc: denied { confidentiality } for pid=3025 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.333456 kernel: Failed to create system directory rpcgss May 15 10:22:50.333514 kernel: Failed to create system directory rpcgss May 15 10:22:50.333532 kernel: Failed to create system directory rpcgss May 15 10:22:50.329000 audit[3025]: AVC avc: denied { confidentiality } for pid=3025 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.329000 audit[3025]: AVC avc: denied { confidentiality } for pid=3025 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.334295 kernel: Failed to create system directory rpcgss May 15 10:22:50.334333 kernel: Failed to create system directory rpcgss May 15 10:22:50.329000 audit[3025]: AVC avc: denied { confidentiality } for pid=3025 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.329000 audit[3025]: AVC avc: denied { confidentiality } for pid=3025 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.335135 kernel: Failed to create system directory rpcgss May 15 10:22:50.335184 kernel: Failed to create system directory rpcgss May 15 10:22:50.329000 audit[3025]: AVC avc: denied { confidentiality } for pid=3025 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.329000 audit[3025]: AVC avc: denied { confidentiality } for pid=3025 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.329000 audit[3025]: AVC avc: denied { confidentiality } for pid=3025 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.336428 kernel: Failed to create system directory rpcgss May 15 10:22:50.336467 kernel: Failed to create system directory rpcgss May 15 10:22:50.336511 kernel: Failed to create system directory rpcgss May 15 10:22:50.329000 audit[3025]: AVC avc: denied { confidentiality } for pid=3025 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.329000 audit[3025]: AVC avc: denied { confidentiality } for pid=3025 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.337294 kernel: Failed to create system directory rpcgss May 15 10:22:50.337348 kernel: Failed to create system directory rpcgss May 15 10:22:50.329000 audit[3025]: AVC avc: denied { confidentiality } for pid=3025 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.329000 audit[3025]: AVC avc: denied { confidentiality } for pid=3025 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.338128 kernel: Failed to create system directory rpcgss May 15 10:22:50.338167 kernel: Failed to create system directory rpcgss May 15 10:22:50.329000 audit[3025]: AVC avc: denied { confidentiality } for pid=3025 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.329000 audit[3025]: AVC avc: denied { confidentiality } for pid=3025 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.329000 audit[3025]: AVC avc: denied { confidentiality } for pid=3025 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.339416 kernel: Failed to create system directory rpcgss May 15 10:22:50.339469 kernel: Failed to create system directory rpcgss May 15 10:22:50.339493 kernel: Failed to create system directory rpcgss May 15 10:22:50.329000 audit[3025]: AVC avc: denied { confidentiality } for pid=3025 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.329000 audit[3025]: AVC avc: denied { confidentiality } for pid=3025 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.340303 kernel: Failed to create system directory rpcgss May 15 10:22:50.329000 audit[3025]: AVC avc: denied { confidentiality } for pid=3025 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.329000 audit[3025]: AVC avc: denied { confidentiality } for pid=3025 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.341204 kernel: Failed to create system directory rpcgss May 15 10:22:50.341267 kernel: Failed to create system directory rpcgss May 15 10:22:50.341284 kernel: Failed to create system directory rpcgss May 15 10:22:50.329000 audit[3025]: AVC avc: denied { confidentiality } for pid=3025 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.329000 audit[3025]: AVC avc: denied { confidentiality } for pid=3025 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.342136 kernel: Failed to create system directory rpcgss May 15 10:22:50.342179 kernel: Failed to create system directory rpcgss May 15 10:22:50.329000 audit[3025]: AVC avc: denied { confidentiality } for pid=3025 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.329000 audit[3025]: AVC avc: denied { confidentiality } for pid=3025 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.329000 audit[3025]: AVC avc: denied { confidentiality } for pid=3025 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.343394 kernel: Failed to create system directory rpcgss May 15 10:22:50.343461 kernel: Failed to create system directory rpcgss May 15 10:22:50.343481 kernel: Failed to create system directory rpcgss May 15 10:22:50.329000 audit[3025]: AVC avc: denied { confidentiality } for pid=3025 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:22:50.329000 audit[3025]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffffb7842010 a1=5ee7c a2=aaaacb38e028 a3=aaaad9ec4010 items=0 ppid=653 pid=3025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:50.329000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 May 15 10:22:50.359703 nfsidmap[3033]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' May 15 10:22:50.364627 nfsidmap[3036]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' May 15 10:22:50.374000 audit[1277]: AVC avc: denied { watch_reads } for pid=1277 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2451 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 15 10:22:50.374000 audit[1277]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaaff1a96e0 a2=10 a3=0 items=0 ppid=1 pid=1277 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:50.374000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 15 10:22:50.374000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2451 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 15 10:22:50.374000 audit[1277]: AVC avc: denied { watch_reads } for pid=1277 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2451 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 15 10:22:50.374000 audit[1277]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaaff1a96e0 a2=10 a3=0 items=0 ppid=1 pid=1277 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:50.374000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 15 10:22:50.374000 audit[1277]: AVC avc: denied { watch_reads } for pid=1277 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2451 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 15 10:22:50.374000 audit[1277]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaaff1a96e0 a2=10 a3=0 items=0 ppid=1 pid=1277 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:50.374000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2451 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 15 10:22:50.374000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 15 10:22:50.374000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2451 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 15 10:22:50.536192 env[1207]: time="2025-05-15T10:22:50.531917567Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:aa5bcc36-4fd2-4dd5-9709-2d19a093ae46,Namespace:default,Attempt:0,}" May 15 10:22:50.580215 kubelet[1456]: E0515 10:22:50.580112 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:50.667026 systemd-networkd[1037]: cali5ec59c6bf6e: Link UP May 15 10:22:50.669078 systemd-networkd[1037]: cali5ec59c6bf6e: Gained carrier May 15 10:22:50.669174 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 10:22:50.669206 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready May 15 10:22:50.678339 env[1207]: 2025-05-15 10:22:50.592 [INFO][3040] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.109-k8s-test--pod--1-eth0 default aa5bcc36-4fd2-4dd5-9709-2d19a093ae46 1161 0 2025-05-15 10:22:35 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.109 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="516c8ff1f7570ae57e6baa48db46f82304f6a1d78bf930ec9b756a5ef8bc5120" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.109-k8s-test--pod--1-" May 15 10:22:50.678339 env[1207]: 2025-05-15 10:22:50.592 [INFO][3040] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="516c8ff1f7570ae57e6baa48db46f82304f6a1d78bf930ec9b756a5ef8bc5120" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.109-k8s-test--pod--1-eth0" May 15 10:22:50.678339 env[1207]: 2025-05-15 10:22:50.621 [INFO][3053] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="516c8ff1f7570ae57e6baa48db46f82304f6a1d78bf930ec9b756a5ef8bc5120" HandleID="k8s-pod-network.516c8ff1f7570ae57e6baa48db46f82304f6a1d78bf930ec9b756a5ef8bc5120" Workload="10.0.0.109-k8s-test--pod--1-eth0" May 15 10:22:50.678339 env[1207]: 2025-05-15 10:22:50.633 [INFO][3053] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="516c8ff1f7570ae57e6baa48db46f82304f6a1d78bf930ec9b756a5ef8bc5120" HandleID="k8s-pod-network.516c8ff1f7570ae57e6baa48db46f82304f6a1d78bf930ec9b756a5ef8bc5120" Workload="10.0.0.109-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000295790), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.109", "pod":"test-pod-1", "timestamp":"2025-05-15 10:22:50.621403146 +0000 UTC"}, Hostname:"10.0.0.109", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:22:50.678339 env[1207]: 2025-05-15 10:22:50.633 [INFO][3053] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:22:50.678339 env[1207]: 2025-05-15 10:22:50.633 [INFO][3053] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:22:50.678339 env[1207]: 2025-05-15 10:22:50.633 [INFO][3053] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.109' May 15 10:22:50.678339 env[1207]: 2025-05-15 10:22:50.635 [INFO][3053] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.516c8ff1f7570ae57e6baa48db46f82304f6a1d78bf930ec9b756a5ef8bc5120" host="10.0.0.109" May 15 10:22:50.678339 env[1207]: 2025-05-15 10:22:50.638 [INFO][3053] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.109" May 15 10:22:50.678339 env[1207]: 2025-05-15 10:22:50.642 [INFO][3053] ipam/ipam.go 489: Trying affinity for 192.168.112.64/26 host="10.0.0.109" May 15 10:22:50.678339 env[1207]: 2025-05-15 10:22:50.644 [INFO][3053] ipam/ipam.go 155: Attempting to load block cidr=192.168.112.64/26 host="10.0.0.109" May 15 10:22:50.678339 env[1207]: 2025-05-15 10:22:50.647 [INFO][3053] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.112.64/26 host="10.0.0.109" May 15 10:22:50.678339 env[1207]: 2025-05-15 10:22:50.647 [INFO][3053] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.112.64/26 handle="k8s-pod-network.516c8ff1f7570ae57e6baa48db46f82304f6a1d78bf930ec9b756a5ef8bc5120" host="10.0.0.109" May 15 10:22:50.678339 env[1207]: 2025-05-15 10:22:50.648 [INFO][3053] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.516c8ff1f7570ae57e6baa48db46f82304f6a1d78bf930ec9b756a5ef8bc5120 May 15 10:22:50.678339 env[1207]: 2025-05-15 10:22:50.652 [INFO][3053] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.112.64/26 handle="k8s-pod-network.516c8ff1f7570ae57e6baa48db46f82304f6a1d78bf930ec9b756a5ef8bc5120" host="10.0.0.109" May 15 10:22:50.678339 env[1207]: 2025-05-15 10:22:50.661 [INFO][3053] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.112.68/26] block=192.168.112.64/26 handle="k8s-pod-network.516c8ff1f7570ae57e6baa48db46f82304f6a1d78bf930ec9b756a5ef8bc5120" host="10.0.0.109" May 15 10:22:50.678339 env[1207]: 2025-05-15 10:22:50.661 [INFO][3053] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.112.68/26] handle="k8s-pod-network.516c8ff1f7570ae57e6baa48db46f82304f6a1d78bf930ec9b756a5ef8bc5120" host="10.0.0.109" May 15 10:22:50.678339 env[1207]: 2025-05-15 10:22:50.661 [INFO][3053] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:22:50.678339 env[1207]: 2025-05-15 10:22:50.661 [INFO][3053] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.112.68/26] IPv6=[] ContainerID="516c8ff1f7570ae57e6baa48db46f82304f6a1d78bf930ec9b756a5ef8bc5120" HandleID="k8s-pod-network.516c8ff1f7570ae57e6baa48db46f82304f6a1d78bf930ec9b756a5ef8bc5120" Workload="10.0.0.109-k8s-test--pod--1-eth0" May 15 10:22:50.678339 env[1207]: 2025-05-15 10:22:50.663 [INFO][3040] cni-plugin/k8s.go 386: Populated endpoint ContainerID="516c8ff1f7570ae57e6baa48db46f82304f6a1d78bf930ec9b756a5ef8bc5120" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.109-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.109-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"aa5bcc36-4fd2-4dd5-9709-2d19a093ae46", ResourceVersion:"1161", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 22, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.109", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.112.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:22:50.678877 env[1207]: 2025-05-15 10:22:50.663 [INFO][3040] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.112.68/32] ContainerID="516c8ff1f7570ae57e6baa48db46f82304f6a1d78bf930ec9b756a5ef8bc5120" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.109-k8s-test--pod--1-eth0" May 15 10:22:50.678877 env[1207]: 2025-05-15 10:22:50.663 [INFO][3040] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="516c8ff1f7570ae57e6baa48db46f82304f6a1d78bf930ec9b756a5ef8bc5120" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.109-k8s-test--pod--1-eth0" May 15 10:22:50.678877 env[1207]: 2025-05-15 10:22:50.669 [INFO][3040] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="516c8ff1f7570ae57e6baa48db46f82304f6a1d78bf930ec9b756a5ef8bc5120" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.109-k8s-test--pod--1-eth0" May 15 10:22:50.678877 env[1207]: 2025-05-15 10:22:50.669 [INFO][3040] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="516c8ff1f7570ae57e6baa48db46f82304f6a1d78bf930ec9b756a5ef8bc5120" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.109-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.109-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"aa5bcc36-4fd2-4dd5-9709-2d19a093ae46", ResourceVersion:"1161", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 22, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.109", ContainerID:"516c8ff1f7570ae57e6baa48db46f82304f6a1d78bf930ec9b756a5ef8bc5120", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.112.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"e2:2f:bf:72:39:26", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:22:50.678877 env[1207]: 2025-05-15 10:22:50.675 [INFO][3040] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="516c8ff1f7570ae57e6baa48db46f82304f6a1d78bf930ec9b756a5ef8bc5120" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.109-k8s-test--pod--1-eth0" May 15 10:22:50.685000 audit[3074]: NETFILTER_CFG table=filter:90 family=2 entries=38 op=nft_register_chain pid=3074 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:22:50.685000 audit[3074]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19400 a0=3 a1=ffffceebba90 a2=0 a3=ffff95b62fa8 items=0 ppid=2300 pid=3074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:50.685000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:22:50.691036 env[1207]: time="2025-05-15T10:22:50.690934360Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:22:50.691036 env[1207]: time="2025-05-15T10:22:50.690976164Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:22:50.691036 env[1207]: time="2025-05-15T10:22:50.690986685Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:22:50.691220 env[1207]: time="2025-05-15T10:22:50.691141018Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/516c8ff1f7570ae57e6baa48db46f82304f6a1d78bf930ec9b756a5ef8bc5120 pid=3083 runtime=io.containerd.runc.v2 May 15 10:22:50.701056 systemd[1]: Started cri-containerd-516c8ff1f7570ae57e6baa48db46f82304f6a1d78bf930ec9b756a5ef8bc5120.scope. May 15 10:22:50.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:50.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:50.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:50.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:50.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:50.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:50.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:50.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:50.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:50.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:50.751000 audit: BPF prog-id=123 op=LOAD May 15 10:22:50.751000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:50.751000 audit[3093]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3083 pid=3093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:50.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531366338666631663735373061653537653662616134386462343666 May 15 10:22:50.751000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:50.751000 audit[3093]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3083 pid=3093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:50.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531366338666631663735373061653537653662616134386462343666 May 15 10:22:50.751000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:50.751000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:50.751000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:50.751000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:50.751000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:50.751000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:50.751000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:50.751000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:50.751000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:50.751000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:50.751000 audit: BPF prog-id=124 op=LOAD May 15 10:22:50.751000 audit[3093]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3083 pid=3093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:50.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531366338666631663735373061653537653662616134386462343666 May 15 10:22:50.752000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:50.752000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:50.752000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:50.752000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:50.752000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:50.752000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:50.752000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:50.752000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:50.752000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:50.752000 audit: BPF prog-id=125 op=LOAD May 15 10:22:50.752000 audit[3093]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3083 pid=3093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:50.752000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531366338666631663735373061653537653662616134386462343666 May 15 10:22:50.753000 audit: BPF prog-id=125 op=UNLOAD May 15 10:22:50.753000 audit: BPF prog-id=124 op=UNLOAD May 15 10:22:50.753000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:50.753000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:50.753000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:50.753000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:50.753000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:50.753000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:50.753000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:50.753000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:50.753000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:50.753000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:50.753000 audit: BPF prog-id=126 op=LOAD May 15 10:22:50.753000 audit[3093]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3083 pid=3093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:50.753000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531366338666631663735373061653537653662616134386462343666 May 15 10:22:50.757421 systemd-resolved[1149]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:22:50.777872 env[1207]: time="2025-05-15T10:22:50.777822676Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:aa5bcc36-4fd2-4dd5-9709-2d19a093ae46,Namespace:default,Attempt:0,} returns sandbox id \"516c8ff1f7570ae57e6baa48db46f82304f6a1d78bf930ec9b756a5ef8bc5120\"" May 15 10:22:50.779203 env[1207]: time="2025-05-15T10:22:50.779172712Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 15 10:22:51.033905 env[1207]: time="2025-05-15T10:22:51.033831756Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:51.035459 env[1207]: time="2025-05-15T10:22:51.035409608Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:e8b1cb61bd96acc3ff3c695318c9cc691213d532eee3731d038af92816fcb5f4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:51.037040 env[1207]: time="2025-05-15T10:22:51.036993700Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:51.039576 env[1207]: time="2025-05-15T10:22:51.039527871Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:22:51.042156 env[1207]: time="2025-05-15T10:22:51.040439307Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:e8b1cb61bd96acc3ff3c695318c9cc691213d532eee3731d038af92816fcb5f4\"" May 15 10:22:51.044361 env[1207]: time="2025-05-15T10:22:51.044302669Z" level=info msg="CreateContainer within sandbox \"516c8ff1f7570ae57e6baa48db46f82304f6a1d78bf930ec9b756a5ef8bc5120\" for container &ContainerMetadata{Name:test,Attempt:0,}" May 15 10:22:51.058650 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount370326429.mount: Deactivated successfully. May 15 10:22:51.061402 env[1207]: time="2025-05-15T10:22:51.061354290Z" level=info msg="CreateContainer within sandbox \"516c8ff1f7570ae57e6baa48db46f82304f6a1d78bf930ec9b756a5ef8bc5120\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"95e060465385443ecdb0d68ed802851c86b286fb7a83acc0f08c9f840f9b77e4\"" May 15 10:22:51.061906 env[1207]: time="2025-05-15T10:22:51.061878854Z" level=info msg="StartContainer for \"95e060465385443ecdb0d68ed802851c86b286fb7a83acc0f08c9f840f9b77e4\"" May 15 10:22:51.081212 systemd[1]: Started cri-containerd-95e060465385443ecdb0d68ed802851c86b286fb7a83acc0f08c9f840f9b77e4.scope. May 15 10:22:51.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:51.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:51.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:51.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:51.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:51.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:51.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:51.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:51.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:51.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:51.125000 audit: BPF prog-id=127 op=LOAD May 15 10:22:51.126000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:51.126000 audit[3124]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3083 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:51.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935653036303436353338353434336563646230643638656438303238 May 15 10:22:51.126000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:51.126000 audit[3124]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3083 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:51.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935653036303436353338353434336563646230643638656438303238 May 15 10:22:51.126000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:51.126000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:51.126000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:51.126000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:51.126000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:51.126000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:51.126000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:51.126000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:51.126000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:51.126000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:51.126000 audit: BPF prog-id=128 op=LOAD May 15 10:22:51.126000 audit[3124]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3083 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:51.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935653036303436353338353434336563646230643638656438303238 May 15 10:22:51.126000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:51.126000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:51.126000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:51.126000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:51.126000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:51.126000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:51.126000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:51.126000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:51.126000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:51.126000 audit: BPF prog-id=129 op=LOAD May 15 10:22:51.126000 audit[3124]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3083 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:51.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935653036303436353338353434336563646230643638656438303238 May 15 10:22:51.126000 audit: BPF prog-id=129 op=UNLOAD May 15 10:22:51.126000 audit: BPF prog-id=128 op=UNLOAD May 15 10:22:51.126000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:51.126000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:51.126000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:51.126000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:51.126000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:51.126000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:51.126000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:51.126000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:51.126000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:51.126000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:22:51.126000 audit: BPF prog-id=130 op=LOAD May 15 10:22:51.126000 audit[3124]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3083 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:22:51.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935653036303436353338353434336563646230643638656438303238 May 15 10:22:51.142262 env[1207]: time="2025-05-15T10:22:51.142201588Z" level=info msg="StartContainer for \"95e060465385443ecdb0d68ed802851c86b286fb7a83acc0f08c9f840f9b77e4\" returns successfully" May 15 10:22:51.580717 kubelet[1456]: E0515 10:22:51.580674 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:51.865439 kubelet[1456]: I0515 10:22:51.865311 1456 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=16.601477003 podStartE2EDuration="16.86529469s" podCreationTimestamp="2025-05-15 10:22:35 +0000 UTC" firstStartedPulling="2025-05-15 10:22:50.778966175 +0000 UTC m=+52.661170563" lastFinishedPulling="2025-05-15 10:22:51.042783862 +0000 UTC m=+52.924988250" observedRunningTime="2025-05-15 10:22:51.865125916 +0000 UTC m=+53.747330304" watchObservedRunningTime="2025-05-15 10:22:51.86529469 +0000 UTC m=+53.747499038" May 15 10:22:52.581037 kubelet[1456]: E0515 10:22:52.580997 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:52.667347 systemd-networkd[1037]: cali5ec59c6bf6e: Gained IPv6LL May 15 10:22:53.581961 kubelet[1456]: E0515 10:22:53.581918 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:54.582935 kubelet[1456]: E0515 10:22:54.582867 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:55.583569 kubelet[1456]: E0515 10:22:55.583511 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:56.584450 kubelet[1456]: E0515 10:22:56.584406 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:22:57.585304 kubelet[1456]: E0515 10:22:57.585236 1456 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"