May 15 10:19:19.771304 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] May 15 10:19:19.771324 kernel: Linux version 5.15.182-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Thu May 15 09:09:56 -00 2025 May 15 10:19:19.771331 kernel: efi: EFI v2.70 by EDK II May 15 10:19:19.771337 kernel: efi: SMBIOS 3.0=0xd9260000 ACPI 2.0=0xd9240000 MEMATTR=0xda32b018 RNG=0xd9220018 MEMRESERVE=0xd9521c18 May 15 10:19:19.771342 kernel: random: crng init done May 15 10:19:19.771348 kernel: ACPI: Early table checksum verification disabled May 15 10:19:19.771354 kernel: ACPI: RSDP 0x00000000D9240000 000024 (v02 BOCHS ) May 15 10:19:19.771361 kernel: ACPI: XSDT 0x00000000D9230000 000064 (v01 BOCHS BXPC 00000001 01000013) May 15 10:19:19.771366 kernel: ACPI: FACP 0x00000000D91E0000 000114 (v06 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:19:19.771372 kernel: ACPI: DSDT 0x00000000D91F0000 0014A2 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:19:19.771378 kernel: ACPI: APIC 0x00000000D91D0000 0001A8 (v04 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:19:19.771383 kernel: ACPI: PPTT 0x00000000D91C0000 00009C (v02 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:19:19.771388 kernel: ACPI: GTDT 0x00000000D91B0000 000060 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:19:19.771394 kernel: ACPI: MCFG 0x00000000D91A0000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:19:19.771403 kernel: ACPI: SPCR 0x00000000D9190000 000050 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:19:19.771408 kernel: ACPI: DBG2 0x00000000D9180000 000057 (v00 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:19:19.771414 kernel: ACPI: IORT 0x00000000D9170000 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:19:19.771420 kernel: ACPI: SPCR: console: pl011,mmio,0x9000000,9600 May 15 10:19:19.771426 kernel: NUMA: Failed to initialise from firmware May 15 10:19:19.771432 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000000dcffffff] May 15 10:19:19.771438 kernel: NUMA: NODE_DATA [mem 0xdcb0a900-0xdcb0ffff] May 15 10:19:19.771443 kernel: Zone ranges: May 15 10:19:19.771449 kernel: DMA [mem 0x0000000040000000-0x00000000dcffffff] May 15 10:19:19.771456 kernel: DMA32 empty May 15 10:19:19.771461 kernel: Normal empty May 15 10:19:19.771467 kernel: Movable zone start for each node May 15 10:19:19.771473 kernel: Early memory node ranges May 15 10:19:19.771478 kernel: node 0: [mem 0x0000000040000000-0x00000000d924ffff] May 15 10:19:19.771484 kernel: node 0: [mem 0x00000000d9250000-0x00000000d951ffff] May 15 10:19:19.771490 kernel: node 0: [mem 0x00000000d9520000-0x00000000dc7fffff] May 15 10:19:19.771496 kernel: node 0: [mem 0x00000000dc800000-0x00000000dc88ffff] May 15 10:19:19.772088 kernel: node 0: [mem 0x00000000dc890000-0x00000000dc89ffff] May 15 10:19:19.772102 kernel: node 0: [mem 0x00000000dc8a0000-0x00000000dc9bffff] May 15 10:19:19.772108 kernel: node 0: [mem 0x00000000dc9c0000-0x00000000dcffffff] May 15 10:19:19.772114 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000000dcffffff] May 15 10:19:19.772123 kernel: On node 0, zone DMA: 12288 pages in unavailable ranges May 15 10:19:19.772129 kernel: psci: probing for conduit method from ACPI. May 15 10:19:19.772135 kernel: psci: PSCIv1.1 detected in firmware. May 15 10:19:19.772140 kernel: psci: Using standard PSCI v0.2 function IDs May 15 10:19:19.772146 kernel: psci: Trusted OS migration not required May 15 10:19:19.772155 kernel: psci: SMC Calling Convention v1.1 May 15 10:19:19.772161 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000003) May 15 10:19:19.772169 kernel: ACPI: SRAT not present May 15 10:19:19.772175 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 May 15 10:19:19.772189 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 May 15 10:19:19.772207 kernel: pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 May 15 10:19:19.772214 kernel: Detected PIPT I-cache on CPU0 May 15 10:19:19.772220 kernel: CPU features: detected: GIC system register CPU interface May 15 10:19:19.772226 kernel: CPU features: detected: Hardware dirty bit management May 15 10:19:19.772232 kernel: CPU features: detected: Spectre-v4 May 15 10:19:19.772238 kernel: CPU features: detected: Spectre-BHB May 15 10:19:19.772247 kernel: CPU features: kernel page table isolation forced ON by KASLR May 15 10:19:19.772253 kernel: CPU features: detected: Kernel page table isolation (KPTI) May 15 10:19:19.772259 kernel: CPU features: detected: ARM erratum 1418040 May 15 10:19:19.772265 kernel: CPU features: detected: SSBS not fully self-synchronizing May 15 10:19:19.772271 kernel: Built 1 zonelists, mobility grouping on. Total pages: 633024 May 15 10:19:19.772277 kernel: Policy zone: DMA May 15 10:19:19.772285 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=aa29d2e9841b6b978238db9eff73afa5af149616ae25608914babb265d82dda7 May 15 10:19:19.772292 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 15 10:19:19.772298 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 15 10:19:19.772304 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 15 10:19:19.772310 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 15 10:19:19.772318 kernel: Memory: 2457400K/2572288K available (9792K kernel code, 2094K rwdata, 7584K rodata, 36416K init, 777K bss, 114888K reserved, 0K cma-reserved) May 15 10:19:19.772325 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 May 15 10:19:19.772331 kernel: trace event string verifier disabled May 15 10:19:19.772337 kernel: rcu: Preemptible hierarchical RCU implementation. May 15 10:19:19.772344 kernel: rcu: RCU event tracing is enabled. May 15 10:19:19.772350 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. May 15 10:19:19.772359 kernel: Trampoline variant of Tasks RCU enabled. May 15 10:19:19.772366 kernel: Tracing variant of Tasks RCU enabled. May 15 10:19:19.772372 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 15 10:19:19.772378 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 May 15 10:19:19.772385 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 May 15 10:19:19.772392 kernel: GICv3: 256 SPIs implemented May 15 10:19:19.772398 kernel: GICv3: 0 Extended SPIs implemented May 15 10:19:19.772405 kernel: GICv3: Distributor has no Range Selector support May 15 10:19:19.772411 kernel: Root IRQ handler: gic_handle_irq May 15 10:19:19.772417 kernel: GICv3: 16 PPIs implemented May 15 10:19:19.772423 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000080a0000 May 15 10:19:19.772429 kernel: ACPI: SRAT not present May 15 10:19:19.772435 kernel: ITS [mem 0x08080000-0x0809ffff] May 15 10:19:19.772441 kernel: ITS@0x0000000008080000: allocated 8192 Devices @400b0000 (indirect, esz 8, psz 64K, shr 1) May 15 10:19:19.772447 kernel: ITS@0x0000000008080000: allocated 8192 Interrupt Collections @400c0000 (flat, esz 8, psz 64K, shr 1) May 15 10:19:19.772454 kernel: GICv3: using LPI property table @0x00000000400d0000 May 15 10:19:19.772460 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000000400e0000 May 15 10:19:19.772467 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 15 10:19:19.772473 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). May 15 10:19:19.772480 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns May 15 10:19:19.772486 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns May 15 10:19:19.772492 kernel: arm-pv: using stolen time PV May 15 10:19:19.772499 kernel: Console: colour dummy device 80x25 May 15 10:19:19.772505 kernel: ACPI: Core revision 20210730 May 15 10:19:19.772512 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) May 15 10:19:19.772518 kernel: pid_max: default: 32768 minimum: 301 May 15 10:19:19.772524 kernel: LSM: Security Framework initializing May 15 10:19:19.772532 kernel: SELinux: Initializing. May 15 10:19:19.772538 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 15 10:19:19.772545 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 15 10:19:19.772551 kernel: ACPI PPTT: PPTT table found, but unable to locate core 3 (3) May 15 10:19:19.772557 kernel: rcu: Hierarchical SRCU implementation. May 15 10:19:19.772563 kernel: Platform MSI: ITS@0x8080000 domain created May 15 10:19:19.772570 kernel: PCI/MSI: ITS@0x8080000 domain created May 15 10:19:19.772576 kernel: Remapping and enabling EFI services. May 15 10:19:19.772582 kernel: smp: Bringing up secondary CPUs ... May 15 10:19:19.772596 kernel: Detected PIPT I-cache on CPU1 May 15 10:19:19.772605 kernel: GICv3: CPU1: found redistributor 1 region 0:0x00000000080c0000 May 15 10:19:19.772611 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000000400f0000 May 15 10:19:19.772618 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 15 10:19:19.772624 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] May 15 10:19:19.772650 kernel: Detected PIPT I-cache on CPU2 May 15 10:19:19.772657 kernel: GICv3: CPU2: found redistributor 2 region 0:0x00000000080e0000 May 15 10:19:19.772664 kernel: GICv3: CPU2: using allocated LPI pending table @0x0000000040100000 May 15 10:19:19.772670 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 15 10:19:19.772676 kernel: CPU2: Booted secondary processor 0x0000000002 [0x413fd0c1] May 15 10:19:19.772684 kernel: Detected PIPT I-cache on CPU3 May 15 10:19:19.772690 kernel: GICv3: CPU3: found redistributor 3 region 0:0x0000000008100000 May 15 10:19:19.772696 kernel: GICv3: CPU3: using allocated LPI pending table @0x0000000040110000 May 15 10:19:19.772702 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 15 10:19:19.772713 kernel: CPU3: Booted secondary processor 0x0000000003 [0x413fd0c1] May 15 10:19:19.772720 kernel: smp: Brought up 1 node, 4 CPUs May 15 10:19:19.772727 kernel: SMP: Total of 4 processors activated. May 15 10:19:19.772733 kernel: CPU features: detected: 32-bit EL0 Support May 15 10:19:19.772740 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence May 15 10:19:19.772746 kernel: CPU features: detected: Common not Private translations May 15 10:19:19.772753 kernel: CPU features: detected: CRC32 instructions May 15 10:19:19.772759 kernel: CPU features: detected: RCpc load-acquire (LDAPR) May 15 10:19:19.772767 kernel: CPU features: detected: LSE atomic instructions May 15 10:19:19.772774 kernel: CPU features: detected: Privileged Access Never May 15 10:19:19.772780 kernel: CPU features: detected: RAS Extension Support May 15 10:19:19.772789 kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS) May 15 10:19:19.772796 kernel: CPU: All CPU(s) started at EL1 May 15 10:19:19.772804 kernel: alternatives: patching kernel code May 15 10:19:19.772810 kernel: devtmpfs: initialized May 15 10:19:19.772817 kernel: KASLR enabled May 15 10:19:19.772823 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 15 10:19:19.772830 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) May 15 10:19:19.772837 kernel: pinctrl core: initialized pinctrl subsystem May 15 10:19:19.772843 kernel: SMBIOS 3.0.0 present. May 15 10:19:19.772850 kernel: DMI: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 May 15 10:19:19.772856 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 15 10:19:19.772864 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations May 15 10:19:19.772871 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations May 15 10:19:19.772878 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations May 15 10:19:19.772884 kernel: audit: initializing netlink subsys (disabled) May 15 10:19:19.772891 kernel: audit: type=2000 audit(0.051:1): state=initialized audit_enabled=0 res=1 May 15 10:19:19.772897 kernel: thermal_sys: Registered thermal governor 'step_wise' May 15 10:19:19.772904 kernel: cpuidle: using governor menu May 15 10:19:19.772910 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. May 15 10:19:19.772917 kernel: ASID allocator initialised with 32768 entries May 15 10:19:19.772925 kernel: ACPI: bus type PCI registered May 15 10:19:19.772932 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 15 10:19:19.772938 kernel: Serial: AMBA PL011 UART driver May 15 10:19:19.772945 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 15 10:19:19.772951 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages May 15 10:19:19.772958 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 15 10:19:19.772964 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages May 15 10:19:19.772971 kernel: cryptd: max_cpu_qlen set to 1000 May 15 10:19:19.772978 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) May 15 10:19:19.772986 kernel: ACPI: Added _OSI(Module Device) May 15 10:19:19.772992 kernel: ACPI: Added _OSI(Processor Device) May 15 10:19:19.772999 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 15 10:19:19.773005 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 15 10:19:19.773012 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 15 10:19:19.773018 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 15 10:19:19.773025 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 15 10:19:19.773031 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 15 10:19:19.773038 kernel: ACPI: Interpreter enabled May 15 10:19:19.773045 kernel: ACPI: Using GIC for interrupt routing May 15 10:19:19.773052 kernel: ACPI: MCFG table detected, 1 entries May 15 10:19:19.773058 kernel: ARMH0011:00: ttyAMA0 at MMIO 0x9000000 (irq = 12, base_baud = 0) is a SBSA May 15 10:19:19.773065 kernel: printk: console [ttyAMA0] enabled May 15 10:19:19.773071 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 15 10:19:19.773223 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 15 10:19:19.773290 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] May 15 10:19:19.773347 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] May 15 10:19:19.773407 kernel: acpi PNP0A08:00: ECAM area [mem 0x4010000000-0x401fffffff] reserved by PNP0C02:00 May 15 10:19:19.773462 kernel: acpi PNP0A08:00: ECAM at [mem 0x4010000000-0x401fffffff] for [bus 00-ff] May 15 10:19:19.773471 kernel: ACPI: Remapped I/O 0x000000003eff0000 to [io 0x0000-0xffff window] May 15 10:19:19.773478 kernel: PCI host bridge to bus 0000:00 May 15 10:19:19.773553 kernel: pci_bus 0000:00: root bus resource [mem 0x10000000-0x3efeffff window] May 15 10:19:19.773615 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] May 15 10:19:19.773668 kernel: pci_bus 0000:00: root bus resource [mem 0x8000000000-0xffffffffff window] May 15 10:19:19.773720 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 15 10:19:19.773793 kernel: pci 0000:00:00.0: [1b36:0008] type 00 class 0x060000 May 15 10:19:19.773859 kernel: pci 0000:00:01.0: [1af4:1005] type 00 class 0x00ff00 May 15 10:19:19.773919 kernel: pci 0000:00:01.0: reg 0x10: [io 0x0000-0x001f] May 15 10:19:19.773978 kernel: pci 0000:00:01.0: reg 0x14: [mem 0x10000000-0x10000fff] May 15 10:19:19.774051 kernel: pci 0000:00:01.0: reg 0x20: [mem 0x8000000000-0x8000003fff 64bit pref] May 15 10:19:19.774109 kernel: pci 0000:00:01.0: BAR 4: assigned [mem 0x8000000000-0x8000003fff 64bit pref] May 15 10:19:19.774168 kernel: pci 0000:00:01.0: BAR 1: assigned [mem 0x10000000-0x10000fff] May 15 10:19:19.774245 kernel: pci 0000:00:01.0: BAR 0: assigned [io 0x1000-0x101f] May 15 10:19:19.774302 kernel: pci_bus 0000:00: resource 4 [mem 0x10000000-0x3efeffff window] May 15 10:19:19.774356 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] May 15 10:19:19.774409 kernel: pci_bus 0000:00: resource 6 [mem 0x8000000000-0xffffffffff window] May 15 10:19:19.774418 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 May 15 10:19:19.774425 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 May 15 10:19:19.774433 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 May 15 10:19:19.774444 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 May 15 10:19:19.774452 kernel: iommu: Default domain type: Translated May 15 10:19:19.774459 kernel: iommu: DMA domain TLB invalidation policy: strict mode May 15 10:19:19.774467 kernel: vgaarb: loaded May 15 10:19:19.774474 kernel: pps_core: LinuxPPS API ver. 1 registered May 15 10:19:19.774481 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 15 10:19:19.774488 kernel: PTP clock support registered May 15 10:19:19.774494 kernel: Registered efivars operations May 15 10:19:19.774503 kernel: clocksource: Switched to clocksource arch_sys_counter May 15 10:19:19.774509 kernel: VFS: Disk quotas dquot_6.6.0 May 15 10:19:19.774516 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 15 10:19:19.774523 kernel: pnp: PnP ACPI init May 15 10:19:19.774592 kernel: system 00:00: [mem 0x4010000000-0x401fffffff window] could not be reserved May 15 10:19:19.774859 kernel: pnp: PnP ACPI: found 1 devices May 15 10:19:19.774867 kernel: NET: Registered PF_INET protocol family May 15 10:19:19.774874 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 15 10:19:19.774884 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 15 10:19:19.774891 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 15 10:19:19.774898 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 15 10:19:19.774904 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 15 10:19:19.774912 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 15 10:19:19.774919 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 15 10:19:19.774926 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 15 10:19:19.774933 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 15 10:19:19.774939 kernel: PCI: CLS 0 bytes, default 64 May 15 10:19:19.774948 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 7 counters available May 15 10:19:19.774955 kernel: kvm [1]: HYP mode not available May 15 10:19:19.774962 kernel: Initialise system trusted keyrings May 15 10:19:19.774968 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 15 10:19:19.774975 kernel: Key type asymmetric registered May 15 10:19:19.774982 kernel: Asymmetric key parser 'x509' registered May 15 10:19:19.774989 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 15 10:19:19.774996 kernel: io scheduler mq-deadline registered May 15 10:19:19.775003 kernel: io scheduler kyber registered May 15 10:19:19.775011 kernel: io scheduler bfq registered May 15 10:19:19.775018 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 May 15 10:19:19.775024 kernel: ACPI: button: Power Button [PWRB] May 15 10:19:19.775031 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 May 15 10:19:19.775120 kernel: virtio-pci 0000:00:01.0: enabling device (0005 -> 0007) May 15 10:19:19.775129 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 15 10:19:19.775136 kernel: thunder_xcv, ver 1.0 May 15 10:19:19.775143 kernel: thunder_bgx, ver 1.0 May 15 10:19:19.775149 kernel: nicpf, ver 1.0 May 15 10:19:19.775158 kernel: nicvf, ver 1.0 May 15 10:19:19.775300 kernel: rtc-efi rtc-efi.0: registered as rtc0 May 15 10:19:19.775643 kernel: rtc-efi rtc-efi.0: setting system clock to 2025-05-15T10:19:19 UTC (1747304359) May 15 10:19:19.775660 kernel: hid: raw HID events driver (C) Jiri Kosina May 15 10:19:19.775667 kernel: NET: Registered PF_INET6 protocol family May 15 10:19:19.775674 kernel: Segment Routing with IPv6 May 15 10:19:19.775680 kernel: In-situ OAM (IOAM) with IPv6 May 15 10:19:19.775688 kernel: NET: Registered PF_PACKET protocol family May 15 10:19:19.775698 kernel: Key type dns_resolver registered May 15 10:19:19.775705 kernel: registered taskstats version 1 May 15 10:19:19.775712 kernel: Loading compiled-in X.509 certificates May 15 10:19:19.775719 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.182-flatcar: 3679cbfb4d4756a2ddc177f0eaedea33fb5fdf2e' May 15 10:19:19.775726 kernel: Key type .fscrypt registered May 15 10:19:19.775733 kernel: Key type fscrypt-provisioning registered May 15 10:19:19.775740 kernel: ima: No TPM chip found, activating TPM-bypass! May 15 10:19:19.775746 kernel: ima: Allocated hash algorithm: sha1 May 15 10:19:19.775753 kernel: ima: No architecture policies found May 15 10:19:19.775760 kernel: clk: Disabling unused clocks May 15 10:19:19.775767 kernel: Freeing unused kernel memory: 36416K May 15 10:19:19.775774 kernel: Run /init as init process May 15 10:19:19.775780 kernel: with arguments: May 15 10:19:19.775787 kernel: /init May 15 10:19:19.775793 kernel: with environment: May 15 10:19:19.775800 kernel: HOME=/ May 15 10:19:19.775806 kernel: TERM=linux May 15 10:19:19.775813 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 15 10:19:19.775823 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 15 10:19:19.775832 systemd[1]: Detected virtualization kvm. May 15 10:19:19.775839 systemd[1]: Detected architecture arm64. May 15 10:19:19.775846 systemd[1]: Running in initrd. May 15 10:19:19.775853 systemd[1]: No hostname configured, using default hostname. May 15 10:19:19.775860 systemd[1]: Hostname set to . May 15 10:19:19.775867 systemd[1]: Initializing machine ID from VM UUID. May 15 10:19:19.775875 systemd[1]: Queued start job for default target initrd.target. May 15 10:19:19.775883 systemd[1]: Started systemd-ask-password-console.path. May 15 10:19:19.775889 systemd[1]: Reached target cryptsetup.target. May 15 10:19:19.775896 systemd[1]: Reached target paths.target. May 15 10:19:19.775903 systemd[1]: Reached target slices.target. May 15 10:19:19.775910 systemd[1]: Reached target swap.target. May 15 10:19:19.775917 systemd[1]: Reached target timers.target. May 15 10:19:19.775925 systemd[1]: Listening on iscsid.socket. May 15 10:19:19.776476 systemd[1]: Listening on iscsiuio.socket. May 15 10:19:19.776493 systemd[1]: Listening on systemd-journald-audit.socket. May 15 10:19:19.776501 systemd[1]: Listening on systemd-journald-dev-log.socket. May 15 10:19:19.776508 systemd[1]: Listening on systemd-journald.socket. May 15 10:19:19.776516 systemd[1]: Listening on systemd-networkd.socket. May 15 10:19:19.776523 systemd[1]: Listening on systemd-udevd-control.socket. May 15 10:19:19.776530 systemd[1]: Listening on systemd-udevd-kernel.socket. May 15 10:19:19.776538 systemd[1]: Reached target sockets.target. May 15 10:19:19.776549 systemd[1]: Starting kmod-static-nodes.service... May 15 10:19:19.776557 systemd[1]: Finished network-cleanup.service. May 15 10:19:19.776564 systemd[1]: Starting systemd-fsck-usr.service... May 15 10:19:19.776571 systemd[1]: Starting systemd-journald.service... May 15 10:19:19.776578 systemd[1]: Starting systemd-modules-load.service... May 15 10:19:19.776589 systemd[1]: Starting systemd-resolved.service... May 15 10:19:19.776599 systemd[1]: Starting systemd-vconsole-setup.service... May 15 10:19:19.776606 systemd[1]: Finished kmod-static-nodes.service. May 15 10:19:19.776613 systemd[1]: Finished systemd-fsck-usr.service. May 15 10:19:19.776622 systemd[1]: Finished systemd-vconsole-setup.service. May 15 10:19:19.776629 systemd[1]: Starting dracut-cmdline-ask.service... May 15 10:19:19.776636 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 15 10:19:19.776643 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 15 10:19:19.776650 systemd[1]: Finished dracut-cmdline-ask.service. May 15 10:19:19.776657 systemd[1]: Starting dracut-cmdline.service... May 15 10:19:19.776664 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 15 10:19:19.776671 kernel: Bridge firewalling registered May 15 10:19:19.776681 systemd-journald[289]: Journal started May 15 10:19:19.776730 systemd-journald[289]: Runtime Journal (/run/log/journal/88a4f21254d249f1809ec4eece94b5d8) is 6.0M, max 48.7M, 42.6M free. May 15 10:19:19.743804 systemd-modules-load[290]: Inserted module 'overlay' May 15 10:19:19.778446 systemd[1]: Started systemd-journald.service. May 15 10:19:19.773545 systemd-modules-load[290]: Inserted module 'br_netfilter' May 15 10:19:19.783312 kernel: audit: type=1130 audit(1747304359.779:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:19.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:19.776676 systemd-resolved[291]: Positive Trust Anchors: May 15 10:19:19.787851 kernel: SCSI subsystem initialized May 15 10:19:19.787867 kernel: audit: type=1130 audit(1747304359.784:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:19.784000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:19.776684 systemd-resolved[291]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 15 10:19:19.776711 systemd-resolved[291]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 15 10:19:19.797757 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 15 10:19:19.797774 kernel: device-mapper: uevent: version 1.0.3 May 15 10:19:19.782693 systemd-resolved[291]: Defaulting to hostname 'linux'. May 15 10:19:19.799738 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 15 10:19:19.783509 systemd[1]: Started systemd-resolved.service. May 15 10:19:19.801178 dracut-cmdline[308]: dracut-dracut-053 May 15 10:19:19.801178 dracut-cmdline[308]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 f May 15 10:19:19.801178 dracut-cmdline[308]: latcar.first_boot=detected acpi=force verity.usrhash=aa29d2e9841b6b978238db9eff73afa5af149616ae25608914babb265d82dda7 May 15 10:19:19.812464 kernel: audit: type=1130 audit(1747304359.803:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:19.803000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:19.784433 systemd[1]: Reached target nss-lookup.target. May 15 10:19:19.801082 systemd-modules-load[290]: Inserted module 'dm_multipath' May 15 10:19:19.801854 systemd[1]: Finished systemd-modules-load.service. May 15 10:19:19.814000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:19.804652 systemd[1]: Starting systemd-sysctl.service... May 15 10:19:19.819696 kernel: audit: type=1130 audit(1747304359.814:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:19.813981 systemd[1]: Finished systemd-sysctl.service. May 15 10:19:19.858222 kernel: Loading iSCSI transport class v2.0-870. May 15 10:19:19.871219 kernel: iscsi: registered transport (tcp) May 15 10:19:19.886346 kernel: iscsi: registered transport (qla4xxx) May 15 10:19:19.886379 kernel: QLogic iSCSI HBA Driver May 15 10:19:19.920129 systemd[1]: Finished dracut-cmdline.service. May 15 10:19:19.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:19.921865 systemd[1]: Starting dracut-pre-udev.service... May 15 10:19:19.925426 kernel: audit: type=1130 audit(1747304359.920:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:19.967237 kernel: raid6: neonx8 gen() 13741 MB/s May 15 10:19:19.984222 kernel: raid6: neonx8 xor() 10713 MB/s May 15 10:19:20.001223 kernel: raid6: neonx4 gen() 13444 MB/s May 15 10:19:20.018241 kernel: raid6: neonx4 xor() 11050 MB/s May 15 10:19:20.035219 kernel: raid6: neonx2 gen() 12977 MB/s May 15 10:19:20.052222 kernel: raid6: neonx2 xor() 10253 MB/s May 15 10:19:20.069219 kernel: raid6: neonx1 gen() 10542 MB/s May 15 10:19:20.086244 kernel: raid6: neonx1 xor() 8769 MB/s May 15 10:19:20.103226 kernel: raid6: int64x8 gen() 6249 MB/s May 15 10:19:20.120245 kernel: raid6: int64x8 xor() 3533 MB/s May 15 10:19:20.137220 kernel: raid6: int64x4 gen() 7199 MB/s May 15 10:19:20.154223 kernel: raid6: int64x4 xor() 3841 MB/s May 15 10:19:20.171229 kernel: raid6: int64x2 gen() 6121 MB/s May 15 10:19:20.188219 kernel: raid6: int64x2 xor() 3304 MB/s May 15 10:19:20.205223 kernel: raid6: int64x1 gen() 5022 MB/s May 15 10:19:20.222355 kernel: raid6: int64x1 xor() 2625 MB/s May 15 10:19:20.222389 kernel: raid6: using algorithm neonx8 gen() 13741 MB/s May 15 10:19:20.222398 kernel: raid6: .... xor() 10713 MB/s, rmw enabled May 15 10:19:20.223447 kernel: raid6: using neon recovery algorithm May 15 10:19:20.234645 kernel: xor: measuring software checksum speed May 15 10:19:20.234668 kernel: 8regs : 17209 MB/sec May 15 10:19:20.234684 kernel: 32regs : 20702 MB/sec May 15 10:19:20.235271 kernel: arm64_neon : 27823 MB/sec May 15 10:19:20.235282 kernel: xor: using function: arm64_neon (27823 MB/sec) May 15 10:19:20.290227 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no May 15 10:19:20.300345 systemd[1]: Finished dracut-pre-udev.service. May 15 10:19:20.300000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:20.302218 systemd[1]: Starting systemd-udevd.service... May 15 10:19:20.307284 kernel: audit: type=1130 audit(1747304360.300:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:20.307305 kernel: audit: type=1334 audit(1747304360.301:8): prog-id=7 op=LOAD May 15 10:19:20.307318 kernel: audit: type=1334 audit(1747304360.301:9): prog-id=8 op=LOAD May 15 10:19:20.301000 audit: BPF prog-id=7 op=LOAD May 15 10:19:20.301000 audit: BPF prog-id=8 op=LOAD May 15 10:19:20.316994 systemd-udevd[492]: Using default interface naming scheme 'v252'. May 15 10:19:20.320966 systemd[1]: Started systemd-udevd.service. May 15 10:19:20.323000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:20.324813 systemd[1]: Starting dracut-pre-trigger.service... May 15 10:19:20.326916 kernel: audit: type=1130 audit(1747304360.323:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:20.335373 dracut-pre-trigger[505]: rd.md=0: removing MD RAID activation May 15 10:19:20.361507 systemd[1]: Finished dracut-pre-trigger.service. May 15 10:19:20.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:20.363159 systemd[1]: Starting systemd-udev-trigger.service... May 15 10:19:20.398007 systemd[1]: Finished systemd-udev-trigger.service. May 15 10:19:20.398000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:20.423223 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) May 15 10:19:20.428600 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 15 10:19:20.428615 kernel: GPT:9289727 != 19775487 May 15 10:19:20.428625 kernel: GPT:Alternate GPT header not at the end of the disk. May 15 10:19:20.428634 kernel: GPT:9289727 != 19775487 May 15 10:19:20.428642 kernel: GPT: Use GNU Parted to correct GPT errors. May 15 10:19:20.428651 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 10:19:20.441794 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 15 10:19:20.444664 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (551) May 15 10:19:20.443296 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 15 10:19:20.452044 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 15 10:19:20.455605 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 15 10:19:20.459232 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 15 10:19:20.461774 systemd[1]: Starting disk-uuid.service... May 15 10:19:20.467971 disk-uuid[562]: Primary Header is updated. May 15 10:19:20.467971 disk-uuid[562]: Secondary Entries is updated. May 15 10:19:20.467971 disk-uuid[562]: Secondary Header is updated. May 15 10:19:20.471226 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 10:19:21.485743 disk-uuid[563]: The operation has completed successfully. May 15 10:19:21.486820 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 10:19:21.510447 systemd[1]: disk-uuid.service: Deactivated successfully. May 15 10:19:21.511000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:21.511000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:21.510551 systemd[1]: Finished disk-uuid.service. May 15 10:19:21.512144 systemd[1]: Starting verity-setup.service... May 15 10:19:21.530233 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" May 15 10:19:21.553449 systemd[1]: Found device dev-mapper-usr.device. May 15 10:19:21.555663 systemd[1]: Mounting sysusr-usr.mount... May 15 10:19:21.557480 systemd[1]: Finished verity-setup.service. May 15 10:19:21.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:21.606223 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 15 10:19:21.606538 systemd[1]: Mounted sysusr-usr.mount. May 15 10:19:21.607401 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 15 10:19:21.608145 systemd[1]: Starting ignition-setup.service... May 15 10:19:21.610528 systemd[1]: Starting parse-ip-for-networkd.service... May 15 10:19:21.621843 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm May 15 10:19:21.621878 kernel: BTRFS info (device vda6): using free space tree May 15 10:19:21.621888 kernel: BTRFS info (device vda6): has skinny extents May 15 10:19:21.632695 systemd[1]: mnt-oem.mount: Deactivated successfully. May 15 10:19:21.640460 systemd[1]: Finished ignition-setup.service. May 15 10:19:21.641000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:21.642068 systemd[1]: Starting ignition-fetch-offline.service... May 15 10:19:21.704368 systemd[1]: Finished parse-ip-for-networkd.service. May 15 10:19:21.705000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:21.706000 audit: BPF prog-id=9 op=LOAD May 15 10:19:21.707268 systemd[1]: Starting systemd-networkd.service... May 15 10:19:21.730908 systemd-networkd[737]: lo: Link UP May 15 10:19:21.730922 systemd-networkd[737]: lo: Gained carrier May 15 10:19:21.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:21.731313 systemd-networkd[737]: Enumeration completed May 15 10:19:21.731416 systemd[1]: Started systemd-networkd.service. May 15 10:19:21.731496 systemd-networkd[737]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 15 10:19:21.732543 systemd-networkd[737]: eth0: Link UP May 15 10:19:21.732546 systemd-networkd[737]: eth0: Gained carrier May 15 10:19:21.734582 systemd[1]: Reached target network.target. May 15 10:19:21.736726 systemd[1]: Starting iscsiuio.service... May 15 10:19:21.750388 systemd[1]: Started iscsiuio.service. May 15 10:19:21.750000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:21.752047 systemd[1]: Starting iscsid.service... May 15 10:19:21.752268 systemd-networkd[737]: eth0: DHCPv4 address 10.0.0.90/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 15 10:19:21.753019 ignition[653]: Ignition 2.14.0 May 15 10:19:21.753026 ignition[653]: Stage: fetch-offline May 15 10:19:21.756824 iscsid[742]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 15 10:19:21.756824 iscsid[742]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log May 15 10:19:21.756824 iscsid[742]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 15 10:19:21.756824 iscsid[742]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 15 10:19:21.756824 iscsid[742]: If using hardware iscsi like qla4xxx this message can be ignored. May 15 10:19:21.756824 iscsid[742]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 15 10:19:21.756824 iscsid[742]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 15 10:19:21.762000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:21.753067 ignition[653]: no configs at "/usr/lib/ignition/base.d" May 15 10:19:21.758525 systemd[1]: Started iscsid.service. May 15 10:19:21.753075 ignition[653]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:19:21.763395 systemd[1]: Starting dracut-initqueue.service... May 15 10:19:21.753237 ignition[653]: parsed url from cmdline: "" May 15 10:19:21.773679 systemd[1]: Finished dracut-initqueue.service. May 15 10:19:21.774000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:21.753240 ignition[653]: no config URL provided May 15 10:19:21.774800 systemd[1]: Reached target remote-fs-pre.target. May 15 10:19:21.753245 ignition[653]: reading system config file "/usr/lib/ignition/user.ign" May 15 10:19:21.776376 systemd[1]: Reached target remote-cryptsetup.target. May 15 10:19:21.753253 ignition[653]: no config at "/usr/lib/ignition/user.ign" May 15 10:19:21.778011 systemd[1]: Reached target remote-fs.target. May 15 10:19:21.753272 ignition[653]: op(1): [started] loading QEMU firmware config module May 15 10:19:21.780342 systemd[1]: Starting dracut-pre-mount.service... May 15 10:19:21.753277 ignition[653]: op(1): executing: "modprobe" "qemu_fw_cfg" May 15 10:19:21.767620 ignition[653]: op(1): [finished] loading QEMU firmware config module May 15 10:19:21.785270 ignition[653]: parsing config with SHA512: 791c0820086c6167c6fb8d0a217e3dce1140f45ea6e93277200f7be2528daeb2a4f1f3a8540c8161e1dbc03d76831eec00a5b56a58a31f41d84090da184c0479 May 15 10:19:21.787720 systemd[1]: Finished dracut-pre-mount.service. May 15 10:19:21.788000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:21.798544 unknown[653]: fetched base config from "system" May 15 10:19:21.798556 unknown[653]: fetched user config from "qemu" May 15 10:19:21.798862 ignition[653]: fetch-offline: fetch-offline passed May 15 10:19:21.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:21.799781 systemd[1]: Finished ignition-fetch-offline.service. May 15 10:19:21.798921 ignition[653]: Ignition finished successfully May 15 10:19:21.801028 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 15 10:19:21.801800 systemd[1]: Starting ignition-kargs.service... May 15 10:19:21.810769 ignition[758]: Ignition 2.14.0 May 15 10:19:21.810779 ignition[758]: Stage: kargs May 15 10:19:21.810873 ignition[758]: no configs at "/usr/lib/ignition/base.d" May 15 10:19:21.813096 systemd[1]: Finished ignition-kargs.service. May 15 10:19:21.814000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:21.810883 ignition[758]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:19:21.815517 systemd[1]: Starting ignition-disks.service... May 15 10:19:21.811585 ignition[758]: kargs: kargs passed May 15 10:19:21.811629 ignition[758]: Ignition finished successfully May 15 10:19:21.821643 ignition[764]: Ignition 2.14.0 May 15 10:19:21.821661 ignition[764]: Stage: disks May 15 10:19:21.821750 ignition[764]: no configs at "/usr/lib/ignition/base.d" May 15 10:19:21.821759 ignition[764]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:19:21.824000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:21.823381 systemd[1]: Finished ignition-disks.service. May 15 10:19:21.822737 ignition[764]: disks: disks passed May 15 10:19:21.824667 systemd[1]: Reached target initrd-root-device.target. May 15 10:19:21.822782 ignition[764]: Ignition finished successfully May 15 10:19:21.826386 systemd[1]: Reached target local-fs-pre.target. May 15 10:19:21.827782 systemd[1]: Reached target local-fs.target. May 15 10:19:21.829033 systemd[1]: Reached target sysinit.target. May 15 10:19:21.830485 systemd[1]: Reached target basic.target. May 15 10:19:21.832706 systemd[1]: Starting systemd-fsck-root.service... May 15 10:19:21.844215 systemd-fsck[772]: ROOT: clean, 623/553520 files, 56022/553472 blocks May 15 10:19:21.848774 systemd[1]: Finished systemd-fsck-root.service. May 15 10:19:21.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:21.850746 systemd[1]: Mounting sysroot.mount... May 15 10:19:21.857214 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 15 10:19:21.857816 systemd[1]: Mounted sysroot.mount. May 15 10:19:21.858586 systemd[1]: Reached target initrd-root-fs.target. May 15 10:19:21.861313 systemd[1]: Mounting sysroot-usr.mount... May 15 10:19:21.862157 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 15 10:19:21.862219 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 15 10:19:21.862242 systemd[1]: Reached target ignition-diskful.target. May 15 10:19:21.864009 systemd[1]: Mounted sysroot-usr.mount. May 15 10:19:21.865904 systemd[1]: Starting initrd-setup-root.service... May 15 10:19:21.869974 initrd-setup-root[782]: cut: /sysroot/etc/passwd: No such file or directory May 15 10:19:21.873458 initrd-setup-root[790]: cut: /sysroot/etc/group: No such file or directory May 15 10:19:21.876309 initrd-setup-root[798]: cut: /sysroot/etc/shadow: No such file or directory May 15 10:19:21.880478 initrd-setup-root[806]: cut: /sysroot/etc/gshadow: No such file or directory May 15 10:19:21.905591 systemd[1]: Finished initrd-setup-root.service. May 15 10:19:21.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:21.907220 systemd[1]: Starting ignition-mount.service... May 15 10:19:21.908561 systemd[1]: Starting sysroot-boot.service... May 15 10:19:21.912986 bash[823]: umount: /sysroot/usr/share/oem: not mounted. May 15 10:19:21.921903 ignition[825]: INFO : Ignition 2.14.0 May 15 10:19:21.921903 ignition[825]: INFO : Stage: mount May 15 10:19:21.923528 ignition[825]: INFO : no configs at "/usr/lib/ignition/base.d" May 15 10:19:21.923528 ignition[825]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:19:21.923528 ignition[825]: INFO : mount: mount passed May 15 10:19:21.923528 ignition[825]: INFO : Ignition finished successfully May 15 10:19:21.924000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:21.924070 systemd[1]: Finished ignition-mount.service. May 15 10:19:21.929636 systemd[1]: Finished sysroot-boot.service. May 15 10:19:21.930000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:22.565693 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 15 10:19:22.572619 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (833) May 15 10:19:22.572646 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm May 15 10:19:22.572656 kernel: BTRFS info (device vda6): using free space tree May 15 10:19:22.574205 kernel: BTRFS info (device vda6): has skinny extents May 15 10:19:22.576554 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 15 10:19:22.578097 systemd[1]: Starting ignition-files.service... May 15 10:19:22.591487 ignition[853]: INFO : Ignition 2.14.0 May 15 10:19:22.591487 ignition[853]: INFO : Stage: files May 15 10:19:22.593067 ignition[853]: INFO : no configs at "/usr/lib/ignition/base.d" May 15 10:19:22.593067 ignition[853]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:19:22.593067 ignition[853]: DEBUG : files: compiled without relabeling support, skipping May 15 10:19:22.598317 ignition[853]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 15 10:19:22.598317 ignition[853]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 15 10:19:22.601149 ignition[853]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 15 10:19:22.601149 ignition[853]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 15 10:19:22.601149 ignition[853]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 15 10:19:22.600724 unknown[853]: wrote ssh authorized keys file for user: core May 15 10:19:22.606103 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" May 15 10:19:22.606103 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" May 15 10:19:22.606103 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" May 15 10:19:22.606103 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 15 10:19:22.606103 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.0-arm64.raw" May 15 10:19:22.606103 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.0-arm64.raw" May 15 10:19:22.606103 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.0-arm64.raw" May 15 10:19:22.606103 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.32.0-arm64.raw: attempt #1 May 15 10:19:22.873877 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK May 15 10:19:23.265923 ignition[853]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.0-arm64.raw" May 15 10:19:23.265923 ignition[853]: INFO : files: op(7): [started] processing unit "coreos-metadata.service" May 15 10:19:23.269654 ignition[853]: INFO : files: op(7): op(8): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 15 10:19:23.269654 ignition[853]: INFO : files: op(7): op(8): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 15 10:19:23.269654 ignition[853]: INFO : files: op(7): [finished] processing unit "coreos-metadata.service" May 15 10:19:23.269654 ignition[853]: INFO : files: op(9): [started] setting preset to disabled for "coreos-metadata.service" May 15 10:19:23.269654 ignition[853]: INFO : files: op(9): op(a): [started] removing enablement symlink(s) for "coreos-metadata.service" May 15 10:19:23.284355 systemd-networkd[737]: eth0: Gained IPv6LL May 15 10:19:23.298244 ignition[853]: INFO : files: op(9): op(a): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 15 10:19:23.300346 ignition[853]: INFO : files: op(9): [finished] setting preset to disabled for "coreos-metadata.service" May 15 10:19:23.300346 ignition[853]: INFO : files: createResultFile: createFiles: op(b): [started] writing file "/sysroot/etc/.ignition-result.json" May 15 10:19:23.300346 ignition[853]: INFO : files: createResultFile: createFiles: op(b): [finished] writing file "/sysroot/etc/.ignition-result.json" May 15 10:19:23.300346 ignition[853]: INFO : files: files passed May 15 10:19:23.300346 ignition[853]: INFO : Ignition finished successfully May 15 10:19:23.302000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:23.300660 systemd[1]: Finished ignition-files.service. May 15 10:19:23.303601 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 15 10:19:23.305063 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 15 10:19:23.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:23.311000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:23.313692 initrd-setup-root-after-ignition[879]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory May 15 10:19:23.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:23.305797 systemd[1]: Starting ignition-quench.service... May 15 10:19:23.317236 initrd-setup-root-after-ignition[881]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 15 10:19:23.310924 systemd[1]: ignition-quench.service: Deactivated successfully. May 15 10:19:23.311021 systemd[1]: Finished ignition-quench.service. May 15 10:19:23.312693 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 15 10:19:23.314579 systemd[1]: Reached target ignition-complete.target. May 15 10:19:23.317307 systemd[1]: Starting initrd-parse-etc.service... May 15 10:19:23.333185 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 15 10:19:23.333394 systemd[1]: Finished initrd-parse-etc.service. May 15 10:19:23.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:23.335000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:23.335537 systemd[1]: Reached target initrd-fs.target. May 15 10:19:23.337153 systemd[1]: Reached target initrd.target. May 15 10:19:23.338707 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 15 10:19:23.339888 systemd[1]: Starting dracut-pre-pivot.service... May 15 10:19:23.351550 systemd[1]: Finished dracut-pre-pivot.service. May 15 10:19:23.352000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:23.353408 systemd[1]: Starting initrd-cleanup.service... May 15 10:19:23.362870 systemd[1]: Stopped target nss-lookup.target. May 15 10:19:23.363792 systemd[1]: Stopped target remote-cryptsetup.target. May 15 10:19:23.365891 systemd[1]: Stopped target timers.target. May 15 10:19:23.367355 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 15 10:19:23.368000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:23.367480 systemd[1]: Stopped dracut-pre-pivot.service. May 15 10:19:23.368870 systemd[1]: Stopped target initrd.target. May 15 10:19:23.370399 systemd[1]: Stopped target basic.target. May 15 10:19:23.371815 systemd[1]: Stopped target ignition-complete.target. May 15 10:19:23.373282 systemd[1]: Stopped target ignition-diskful.target. May 15 10:19:23.374695 systemd[1]: Stopped target initrd-root-device.target. May 15 10:19:23.376272 systemd[1]: Stopped target remote-fs.target. May 15 10:19:23.377910 systemd[1]: Stopped target remote-fs-pre.target. May 15 10:19:23.379551 systemd[1]: Stopped target sysinit.target. May 15 10:19:23.380959 systemd[1]: Stopped target local-fs.target. May 15 10:19:23.382368 systemd[1]: Stopped target local-fs-pre.target. May 15 10:19:23.383807 systemd[1]: Stopped target swap.target. May 15 10:19:23.386000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:23.385133 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 15 10:19:23.385279 systemd[1]: Stopped dracut-pre-mount.service. May 15 10:19:23.389000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:23.386699 systemd[1]: Stopped target cryptsetup.target. May 15 10:19:23.391000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:23.388074 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 15 10:19:23.388188 systemd[1]: Stopped dracut-initqueue.service. May 15 10:19:23.389815 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 15 10:19:23.389910 systemd[1]: Stopped ignition-fetch-offline.service. May 15 10:19:23.391370 systemd[1]: Stopped target paths.target. May 15 10:19:23.392718 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 15 10:19:23.397229 systemd[1]: Stopped systemd-ask-password-console.path. May 15 10:19:23.399163 systemd[1]: Stopped target slices.target. May 15 10:19:23.400782 systemd[1]: Stopped target sockets.target. May 15 10:19:23.402164 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 15 10:19:23.403000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:23.402301 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 15 10:19:23.403785 systemd[1]: ignition-files.service: Deactivated successfully. May 15 10:19:23.406000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:23.403871 systemd[1]: Stopped ignition-files.service. May 15 10:19:23.407583 systemd[1]: Stopping ignition-mount.service... May 15 10:19:23.409666 iscsid[742]: iscsid shutting down. May 15 10:19:23.409114 systemd[1]: Stopping iscsid.service... May 15 10:19:23.411130 systemd[1]: Stopping sysroot-boot.service... May 15 10:19:23.412302 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 15 10:19:23.413000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:23.412446 systemd[1]: Stopped systemd-udev-trigger.service. May 15 10:19:23.415000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:23.413958 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 15 10:19:23.414049 systemd[1]: Stopped dracut-pre-trigger.service. May 15 10:19:23.418000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:23.420011 ignition[894]: INFO : Ignition 2.14.0 May 15 10:19:23.420011 ignition[894]: INFO : Stage: umount May 15 10:19:23.420011 ignition[894]: INFO : no configs at "/usr/lib/ignition/base.d" May 15 10:19:23.420011 ignition[894]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:19:23.420011 ignition[894]: INFO : umount: umount passed May 15 10:19:23.420011 ignition[894]: INFO : Ignition finished successfully May 15 10:19:23.420000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:23.424000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:23.424000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:23.417161 systemd[1]: iscsid.service: Deactivated successfully. May 15 10:19:23.428000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:23.417295 systemd[1]: Stopped iscsid.service. May 15 10:19:23.430000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:23.419471 systemd[1]: ignition-mount.service: Deactivated successfully. May 15 10:19:23.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:23.419554 systemd[1]: Stopped ignition-mount.service. May 15 10:19:23.421851 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 15 10:19:23.423306 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 15 10:19:23.437000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:23.423395 systemd[1]: Finished initrd-cleanup.service. May 15 10:19:23.425080 systemd[1]: iscsid.socket: Deactivated successfully. May 15 10:19:23.425117 systemd[1]: Closed iscsid.socket. May 15 10:19:23.427152 systemd[1]: ignition-disks.service: Deactivated successfully. May 15 10:19:23.427210 systemd[1]: Stopped ignition-disks.service. May 15 10:19:23.429257 systemd[1]: ignition-kargs.service: Deactivated successfully. May 15 10:19:23.429298 systemd[1]: Stopped ignition-kargs.service. May 15 10:19:23.430864 systemd[1]: ignition-setup.service: Deactivated successfully. May 15 10:19:23.430904 systemd[1]: Stopped ignition-setup.service. May 15 10:19:23.432339 systemd[1]: Stopping iscsiuio.service... May 15 10:19:23.436415 systemd[1]: iscsiuio.service: Deactivated successfully. May 15 10:19:23.436509 systemd[1]: Stopped iscsiuio.service. May 15 10:19:23.437765 systemd[1]: Stopped target network.target. May 15 10:19:23.440656 systemd[1]: iscsiuio.socket: Deactivated successfully. May 15 10:19:23.440697 systemd[1]: Closed iscsiuio.socket. May 15 10:19:23.443632 systemd[1]: Stopping systemd-networkd.service... May 15 10:19:23.455000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:23.445281 systemd[1]: Stopping systemd-resolved.service... May 15 10:19:23.457000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:23.454250 systemd-networkd[737]: eth0: DHCPv6 lease lost May 15 10:19:23.454842 systemd[1]: systemd-resolved.service: Deactivated successfully. May 15 10:19:23.454936 systemd[1]: Stopped systemd-resolved.service. May 15 10:19:23.462000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:23.456533 systemd[1]: systemd-networkd.service: Deactivated successfully. May 15 10:19:23.463000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:23.456623 systemd[1]: Stopped systemd-networkd.service. May 15 10:19:23.465000 audit: BPF prog-id=6 op=UNLOAD May 15 10:19:23.465000 audit: BPF prog-id=9 op=UNLOAD May 15 10:19:23.465000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:23.458088 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 15 10:19:23.458118 systemd[1]: Closed systemd-networkd.socket. May 15 10:19:23.460032 systemd[1]: Stopping network-cleanup.service... May 15 10:19:23.460818 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 15 10:19:23.473000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:23.460873 systemd[1]: Stopped parse-ip-for-networkd.service. May 15 10:19:23.462631 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 15 10:19:23.462671 systemd[1]: Stopped systemd-sysctl.service. May 15 10:19:23.464963 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 15 10:19:23.465006 systemd[1]: Stopped systemd-modules-load.service. May 15 10:19:23.466259 systemd[1]: Stopping systemd-udevd.service... May 15 10:19:23.479000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:23.471872 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 15 10:19:23.480000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:23.472367 systemd[1]: sysroot-boot.service: Deactivated successfully. May 15 10:19:23.482000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:23.472436 systemd[1]: Stopped sysroot-boot.service. May 15 10:19:23.473967 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 15 10:19:23.474017 systemd[1]: Stopped initrd-setup-root.service. May 15 10:19:23.487000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:23.479995 systemd[1]: systemd-udevd.service: Deactivated successfully. May 15 10:19:23.489000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:23.480124 systemd[1]: Stopped systemd-udevd.service. May 15 10:19:23.490000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:23.481479 systemd[1]: network-cleanup.service: Deactivated successfully. May 15 10:19:23.481566 systemd[1]: Stopped network-cleanup.service. May 15 10:19:23.494000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:23.483225 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 15 10:19:23.495000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:23.483260 systemd[1]: Closed systemd-udevd-control.socket. May 15 10:19:23.497000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:23.484844 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 15 10:19:23.484877 systemd[1]: Closed systemd-udevd-kernel.socket. May 15 10:19:23.500000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:23.500000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:23.486248 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 15 10:19:23.486291 systemd[1]: Stopped dracut-pre-udev.service. May 15 10:19:23.487891 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 15 10:19:23.487931 systemd[1]: Stopped dracut-cmdline.service. May 15 10:19:23.489340 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 15 10:19:23.489380 systemd[1]: Stopped dracut-cmdline-ask.service. May 15 10:19:23.491871 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 15 10:19:23.492817 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. May 15 10:19:23.492876 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. May 15 10:19:23.495233 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 15 10:19:23.495278 systemd[1]: Stopped kmod-static-nodes.service. May 15 10:19:23.496129 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 15 10:19:23.496181 systemd[1]: Stopped systemd-vconsole-setup.service. May 15 10:19:23.498670 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. May 15 10:19:23.499059 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 15 10:19:23.499154 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 15 10:19:23.500715 systemd[1]: Reached target initrd-switch-root.target. May 15 10:19:23.502846 systemd[1]: Starting initrd-switch-root.service... May 15 10:19:23.508891 systemd[1]: Switching root. May 15 10:19:23.525692 systemd-journald[289]: Journal stopped May 15 10:19:25.537590 systemd-journald[289]: Received SIGTERM from PID 1 (systemd). May 15 10:19:25.537636 kernel: SELinux: Class mctp_socket not defined in policy. May 15 10:19:25.537649 kernel: SELinux: Class anon_inode not defined in policy. May 15 10:19:25.537659 kernel: SELinux: the above unknown classes and permissions will be allowed May 15 10:19:25.537670 kernel: SELinux: policy capability network_peer_controls=1 May 15 10:19:25.537698 kernel: SELinux: policy capability open_perms=1 May 15 10:19:25.537709 kernel: SELinux: policy capability extended_socket_class=1 May 15 10:19:25.537721 kernel: SELinux: policy capability always_check_network=0 May 15 10:19:25.537734 kernel: SELinux: policy capability cgroup_seclabel=1 May 15 10:19:25.537744 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 15 10:19:25.537757 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 15 10:19:25.537767 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 15 10:19:25.537777 systemd[1]: Successfully loaded SELinux policy in 36.566ms. May 15 10:19:25.537792 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.868ms. May 15 10:19:25.537805 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 15 10:19:25.537816 systemd[1]: Detected virtualization kvm. May 15 10:19:25.537826 systemd[1]: Detected architecture arm64. May 15 10:19:25.537836 systemd[1]: Detected first boot. May 15 10:19:25.537847 systemd[1]: Initializing machine ID from VM UUID. May 15 10:19:25.537857 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 15 10:19:25.537867 systemd[1]: Populated /etc with preset unit settings. May 15 10:19:25.537878 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 10:19:25.537889 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 10:19:25.537903 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 10:19:25.537913 kernel: kauditd_printk_skb: 78 callbacks suppressed May 15 10:19:25.537923 kernel: audit: type=1334 audit(1747304365.384:82): prog-id=12 op=LOAD May 15 10:19:25.537933 kernel: audit: type=1334 audit(1747304365.384:83): prog-id=3 op=UNLOAD May 15 10:19:25.537942 kernel: audit: type=1334 audit(1747304365.385:84): prog-id=13 op=LOAD May 15 10:19:25.537952 kernel: audit: type=1334 audit(1747304365.386:85): prog-id=14 op=LOAD May 15 10:19:25.537962 kernel: audit: type=1334 audit(1747304365.386:86): prog-id=4 op=UNLOAD May 15 10:19:25.537971 kernel: audit: type=1334 audit(1747304365.386:87): prog-id=5 op=UNLOAD May 15 10:19:25.537982 kernel: audit: type=1334 audit(1747304365.388:88): prog-id=15 op=LOAD May 15 10:19:25.537995 kernel: audit: type=1334 audit(1747304365.388:89): prog-id=12 op=UNLOAD May 15 10:19:25.538004 kernel: audit: type=1334 audit(1747304365.388:90): prog-id=16 op=LOAD May 15 10:19:25.538015 kernel: audit: type=1334 audit(1747304365.389:91): prog-id=17 op=LOAD May 15 10:19:25.538026 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 15 10:19:25.538037 systemd[1]: Stopped initrd-switch-root.service. May 15 10:19:25.538047 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 15 10:19:25.538060 systemd[1]: Created slice system-addon\x2dconfig.slice. May 15 10:19:25.538071 systemd[1]: Created slice system-addon\x2drun.slice. May 15 10:19:25.538082 systemd[1]: Created slice system-getty.slice. May 15 10:19:25.538094 systemd[1]: Created slice system-modprobe.slice. May 15 10:19:25.538104 systemd[1]: Created slice system-serial\x2dgetty.slice. May 15 10:19:25.538114 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 15 10:19:25.538134 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 15 10:19:25.538146 systemd[1]: Created slice user.slice. May 15 10:19:25.538156 systemd[1]: Started systemd-ask-password-console.path. May 15 10:19:25.538169 systemd[1]: Started systemd-ask-password-wall.path. May 15 10:19:25.538179 systemd[1]: Set up automount boot.automount. May 15 10:19:25.538189 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 15 10:19:25.538208 systemd[1]: Stopped target initrd-switch-root.target. May 15 10:19:25.538219 systemd[1]: Stopped target initrd-fs.target. May 15 10:19:25.538229 systemd[1]: Stopped target initrd-root-fs.target. May 15 10:19:25.538240 systemd[1]: Reached target integritysetup.target. May 15 10:19:25.538251 systemd[1]: Reached target remote-cryptsetup.target. May 15 10:19:25.538262 systemd[1]: Reached target remote-fs.target. May 15 10:19:25.538272 systemd[1]: Reached target slices.target. May 15 10:19:25.538283 systemd[1]: Reached target swap.target. May 15 10:19:25.538293 systemd[1]: Reached target torcx.target. May 15 10:19:25.538304 systemd[1]: Reached target veritysetup.target. May 15 10:19:25.538315 systemd[1]: Listening on systemd-coredump.socket. May 15 10:19:25.538325 systemd[1]: Listening on systemd-initctl.socket. May 15 10:19:25.538335 systemd[1]: Listening on systemd-networkd.socket. May 15 10:19:25.538345 systemd[1]: Listening on systemd-udevd-control.socket. May 15 10:19:25.538357 systemd[1]: Listening on systemd-udevd-kernel.socket. May 15 10:19:25.538367 systemd[1]: Listening on systemd-userdbd.socket. May 15 10:19:25.538377 systemd[1]: Mounting dev-hugepages.mount... May 15 10:19:25.538388 systemd[1]: Mounting dev-mqueue.mount... May 15 10:19:25.538399 systemd[1]: Mounting media.mount... May 15 10:19:25.538409 systemd[1]: Mounting sys-kernel-debug.mount... May 15 10:19:25.538422 systemd[1]: Mounting sys-kernel-tracing.mount... May 15 10:19:25.538433 systemd[1]: Mounting tmp.mount... May 15 10:19:25.538443 systemd[1]: Starting flatcar-tmpfiles.service... May 15 10:19:25.538454 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 10:19:25.538465 systemd[1]: Starting kmod-static-nodes.service... May 15 10:19:25.538475 systemd[1]: Starting modprobe@configfs.service... May 15 10:19:25.538486 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:19:25.538496 systemd[1]: Starting modprobe@drm.service... May 15 10:19:25.538507 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:19:25.538517 systemd[1]: Starting modprobe@fuse.service... May 15 10:19:25.538527 systemd[1]: Starting modprobe@loop.service... May 15 10:19:25.538538 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 15 10:19:25.538549 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 15 10:19:25.538559 systemd[1]: Stopped systemd-fsck-root.service. May 15 10:19:25.538569 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 15 10:19:25.538579 systemd[1]: Stopped systemd-fsck-usr.service. May 15 10:19:25.538590 systemd[1]: Stopped systemd-journald.service. May 15 10:19:25.538600 kernel: loop: module loaded May 15 10:19:25.538610 kernel: fuse: init (API version 7.34) May 15 10:19:25.538620 systemd[1]: Starting systemd-journald.service... May 15 10:19:25.538630 systemd[1]: Starting systemd-modules-load.service... May 15 10:19:25.538641 systemd[1]: Starting systemd-network-generator.service... May 15 10:19:25.538652 systemd[1]: Starting systemd-remount-fs.service... May 15 10:19:25.538662 systemd[1]: Starting systemd-udev-trigger.service... May 15 10:19:25.538672 systemd[1]: verity-setup.service: Deactivated successfully. May 15 10:19:25.538682 systemd[1]: Stopped verity-setup.service. May 15 10:19:25.538693 systemd[1]: Mounted dev-hugepages.mount. May 15 10:19:25.538703 systemd[1]: Mounted dev-mqueue.mount. May 15 10:19:25.538714 systemd[1]: Mounted media.mount. May 15 10:19:25.538724 systemd[1]: Mounted sys-kernel-debug.mount. May 15 10:19:25.538735 systemd[1]: Mounted sys-kernel-tracing.mount. May 15 10:19:25.538745 systemd[1]: Mounted tmp.mount. May 15 10:19:25.538756 systemd[1]: Finished kmod-static-nodes.service. May 15 10:19:25.538766 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 15 10:19:25.538776 systemd[1]: Finished modprobe@configfs.service. May 15 10:19:25.538891 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:19:25.538908 systemd-journald[989]: Journal started May 15 10:19:25.538951 systemd-journald[989]: Runtime Journal (/run/log/journal/88a4f21254d249f1809ec4eece94b5d8) is 6.0M, max 48.7M, 42.6M free. May 15 10:19:23.590000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 15 10:19:23.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 15 10:19:23.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 15 10:19:23.663000 audit: BPF prog-id=10 op=LOAD May 15 10:19:23.663000 audit: BPF prog-id=10 op=UNLOAD May 15 10:19:23.663000 audit: BPF prog-id=11 op=LOAD May 15 10:19:23.663000 audit: BPF prog-id=11 op=UNLOAD May 15 10:19:23.706000 audit[927]: AVC avc: denied { associate } for pid=927 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 15 10:19:23.706000 audit[927]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001c589c a1=40000c8de0 a2=40000cf040 a3=32 items=0 ppid=910 pid=927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:23.706000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 15 10:19:23.707000 audit[927]: AVC avc: denied { associate } for pid=927 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 15 10:19:23.707000 audit[927]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40001c5979 a2=1ed a3=0 items=2 ppid=910 pid=927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:23.707000 audit: CWD cwd="/" May 15 10:19:23.707000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:19:23.707000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:19:23.707000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 15 10:19:25.384000 audit: BPF prog-id=12 op=LOAD May 15 10:19:25.384000 audit: BPF prog-id=3 op=UNLOAD May 15 10:19:25.385000 audit: BPF prog-id=13 op=LOAD May 15 10:19:25.386000 audit: BPF prog-id=14 op=LOAD May 15 10:19:25.386000 audit: BPF prog-id=4 op=UNLOAD May 15 10:19:25.386000 audit: BPF prog-id=5 op=UNLOAD May 15 10:19:25.388000 audit: BPF prog-id=15 op=LOAD May 15 10:19:25.388000 audit: BPF prog-id=12 op=UNLOAD May 15 10:19:25.388000 audit: BPF prog-id=16 op=LOAD May 15 10:19:25.389000 audit: BPF prog-id=17 op=LOAD May 15 10:19:25.389000 audit: BPF prog-id=13 op=UNLOAD May 15 10:19:25.389000 audit: BPF prog-id=14 op=UNLOAD May 15 10:19:25.390000 audit: BPF prog-id=18 op=LOAD May 15 10:19:25.390000 audit: BPF prog-id=15 op=UNLOAD May 15 10:19:25.391000 audit: BPF prog-id=19 op=LOAD May 15 10:19:25.392000 audit: BPF prog-id=20 op=LOAD May 15 10:19:25.392000 audit: BPF prog-id=16 op=UNLOAD May 15 10:19:25.392000 audit: BPF prog-id=17 op=UNLOAD May 15 10:19:25.393000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:25.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:25.396000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:25.404000 audit: BPF prog-id=18 op=UNLOAD May 15 10:19:25.494000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:25.497000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:25.499000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:25.499000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:25.503000 audit: BPF prog-id=21 op=LOAD May 15 10:19:25.506000 audit: BPF prog-id=22 op=LOAD May 15 10:19:25.506000 audit: BPF prog-id=23 op=LOAD May 15 10:19:25.506000 audit: BPF prog-id=19 op=UNLOAD May 15 10:19:25.506000 audit: BPF prog-id=20 op=UNLOAD May 15 10:19:25.522000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:25.535000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:25.535000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 15 10:19:25.535000 audit[989]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=5 a1=ffffe5008190 a2=4000 a3=1 items=0 ppid=1 pid=989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:25.535000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 15 10:19:25.538000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:25.538000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:23.702298 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-15T10:19:23Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 10:19:25.383442 systemd[1]: Queued start job for default target multi-user.target. May 15 10:19:23.702557 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-15T10:19:23Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 15 10:19:25.383454 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 15 10:19:23.702576 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-15T10:19:23Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 15 10:19:25.392779 systemd[1]: systemd-journald.service: Deactivated successfully. May 15 10:19:25.540715 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:19:23.702610 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-15T10:19:23Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 15 10:19:23.702619 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-15T10:19:23Z" level=debug msg="skipped missing lower profile" missing profile=oem May 15 10:19:23.702646 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-15T10:19:23Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 15 10:19:23.702657 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-15T10:19:23Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 15 10:19:23.702847 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-15T10:19:23Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 15 10:19:23.702877 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-15T10:19:23Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 15 10:19:23.702889 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-15T10:19:23Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 15 10:19:23.705807 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-15T10:19:23Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 15 10:19:23.705846 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-15T10:19:23Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 15 10:19:23.705866 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-15T10:19:23Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.100: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.100 May 15 10:19:23.705880 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-15T10:19:23Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 15 10:19:23.705899 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-15T10:19:23Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.100: no such file or directory" path=/var/lib/torcx/store/3510.3.100 May 15 10:19:25.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:25.541000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:23.705913 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-15T10:19:23Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 15 10:19:25.134859 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-15T10:19:25Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 10:19:25.135108 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-15T10:19:25Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 10:19:25.135234 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-15T10:19:25Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 10:19:25.135397 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-15T10:19:25Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 10:19:25.135446 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-15T10:19:25Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 15 10:19:25.135499 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-15T10:19:25Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 15 10:19:25.543269 systemd[1]: Started systemd-journald.service. May 15 10:19:25.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:25.544077 systemd[1]: Finished flatcar-tmpfiles.service. May 15 10:19:25.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:25.545327 systemd[1]: modprobe@drm.service: Deactivated successfully. May 15 10:19:25.545490 systemd[1]: Finished modprobe@drm.service. May 15 10:19:25.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:25.546000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:25.546570 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:19:25.546722 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:19:25.547000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:25.547000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:25.547853 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 15 10:19:25.548017 systemd[1]: Finished modprobe@fuse.service. May 15 10:19:25.548000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:25.548000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:25.549243 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:19:25.549412 systemd[1]: Finished modprobe@loop.service. May 15 10:19:25.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:25.550000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:25.550663 systemd[1]: Finished systemd-modules-load.service. May 15 10:19:25.551000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:25.551955 systemd[1]: Finished systemd-network-generator.service. May 15 10:19:25.552000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:25.553383 systemd[1]: Finished systemd-remount-fs.service. May 15 10:19:25.554000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:25.554784 systemd[1]: Reached target network-pre.target. May 15 10:19:25.556977 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 15 10:19:25.559048 systemd[1]: Mounting sys-kernel-config.mount... May 15 10:19:25.559875 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 15 10:19:25.568555 systemd[1]: Starting systemd-hwdb-update.service... May 15 10:19:25.570481 systemd[1]: Starting systemd-journal-flush.service... May 15 10:19:25.571437 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 10:19:25.572407 systemd[1]: Starting systemd-random-seed.service... May 15 10:19:25.573326 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 10:19:25.574431 systemd[1]: Starting systemd-sysctl.service... May 15 10:19:25.576551 systemd[1]: Starting systemd-sysusers.service... May 15 10:19:25.580733 systemd[1]: Finished systemd-udev-trigger.service. May 15 10:19:25.581000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:25.582069 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 15 10:19:25.583092 systemd[1]: Mounted sys-kernel-config.mount. May 15 10:19:25.584696 systemd-journald[989]: Time spent on flushing to /var/log/journal/88a4f21254d249f1809ec4eece94b5d8 is 12.674ms for 991 entries. May 15 10:19:25.584696 systemd-journald[989]: System Journal (/var/log/journal/88a4f21254d249f1809ec4eece94b5d8) is 8.0M, max 195.6M, 187.6M free. May 15 10:19:25.609691 systemd-journald[989]: Received client request to flush runtime journal. May 15 10:19:25.590000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:25.606000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:25.607000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:25.585335 systemd[1]: Starting systemd-udev-settle.service... May 15 10:19:25.589041 systemd[1]: Finished systemd-random-seed.service. May 15 10:19:25.610144 udevadm[1027]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. May 15 10:19:25.590510 systemd[1]: Reached target first-boot-complete.target. May 15 10:19:25.605549 systemd[1]: Finished systemd-sysctl.service. May 15 10:19:25.606850 systemd[1]: Finished systemd-sysusers.service. May 15 10:19:25.608966 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 15 10:19:25.610897 systemd[1]: Finished systemd-journal-flush.service. May 15 10:19:25.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:25.626301 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 15 10:19:25.627000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:25.956432 systemd[1]: Finished systemd-hwdb-update.service. May 15 10:19:25.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:25.957000 audit: BPF prog-id=24 op=LOAD May 15 10:19:25.957000 audit: BPF prog-id=25 op=LOAD May 15 10:19:25.957000 audit: BPF prog-id=7 op=UNLOAD May 15 10:19:25.957000 audit: BPF prog-id=8 op=UNLOAD May 15 10:19:25.958635 systemd[1]: Starting systemd-udevd.service... May 15 10:19:25.979411 systemd-udevd[1033]: Using default interface naming scheme 'v252'. May 15 10:19:25.990799 systemd[1]: Started systemd-udevd.service. May 15 10:19:25.991000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:25.992000 audit: BPF prog-id=26 op=LOAD May 15 10:19:25.993813 systemd[1]: Starting systemd-networkd.service... May 15 10:19:26.022000 audit: BPF prog-id=27 op=LOAD May 15 10:19:26.022000 audit: BPF prog-id=28 op=LOAD May 15 10:19:26.022000 audit: BPF prog-id=29 op=LOAD May 15 10:19:26.023697 systemd[1]: Starting systemd-userdbd.service... May 15 10:19:26.025618 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. May 15 10:19:26.062389 systemd[1]: Started systemd-userdbd.service. May 15 10:19:26.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:26.078810 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 15 10:19:26.117787 systemd[1]: Finished systemd-udev-settle.service. May 15 10:19:26.118000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:26.119131 systemd-networkd[1041]: lo: Link UP May 15 10:19:26.119140 systemd-networkd[1041]: lo: Gained carrier May 15 10:19:26.119535 systemd-networkd[1041]: Enumeration completed May 15 10:19:26.119643 systemd-networkd[1041]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 15 10:19:26.120050 systemd[1]: Starting lvm2-activation-early.service... May 15 10:19:26.121172 systemd[1]: Started systemd-networkd.service. May 15 10:19:26.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:26.124649 systemd-networkd[1041]: eth0: Link UP May 15 10:19:26.124659 systemd-networkd[1041]: eth0: Gained carrier May 15 10:19:26.135993 lvm[1066]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 15 10:19:26.149339 systemd-networkd[1041]: eth0: DHCPv4 address 10.0.0.90/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 15 10:19:26.167052 systemd[1]: Finished lvm2-activation-early.service. May 15 10:19:26.167000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:26.168147 systemd[1]: Reached target cryptsetup.target. May 15 10:19:26.170161 systemd[1]: Starting lvm2-activation.service... May 15 10:19:26.173734 lvm[1067]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 15 10:19:26.202143 systemd[1]: Finished lvm2-activation.service. May 15 10:19:26.202000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:26.203135 systemd[1]: Reached target local-fs-pre.target. May 15 10:19:26.203997 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 15 10:19:26.204025 systemd[1]: Reached target local-fs.target. May 15 10:19:26.204812 systemd[1]: Reached target machines.target. May 15 10:19:26.206808 systemd[1]: Starting ldconfig.service... May 15 10:19:26.208011 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:19:26.208057 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:19:26.209066 systemd[1]: Starting systemd-boot-update.service... May 15 10:19:26.210982 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 15 10:19:26.213098 systemd[1]: Starting systemd-machine-id-commit.service... May 15 10:19:26.215142 systemd[1]: Starting systemd-sysext.service... May 15 10:19:26.216893 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1069 (bootctl) May 15 10:19:26.218508 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 15 10:19:26.229374 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 15 10:19:26.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:26.241991 systemd[1]: Unmounting usr-share-oem.mount... May 15 10:19:26.320190 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 15 10:19:26.320411 systemd[1]: Unmounted usr-share-oem.mount. May 15 10:19:26.333237 kernel: loop0: detected capacity change from 0 to 201592 May 15 10:19:26.354186 systemd[1]: Finished systemd-machine-id-commit.service. May 15 10:19:26.355000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:26.358233 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 15 10:19:26.363053 systemd-fsck[1077]: fsck.fat 4.2 (2021-01-31) May 15 10:19:26.363053 systemd-fsck[1077]: /dev/vda1: 236 files, 117182/258078 clusters May 15 10:19:26.363802 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 15 10:19:26.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:26.381225 kernel: loop1: detected capacity change from 0 to 201592 May 15 10:19:26.388835 (sd-sysext)[1082]: Using extensions 'kubernetes'. May 15 10:19:26.389622 (sd-sysext)[1082]: Merged extensions into '/usr'. May 15 10:19:26.406679 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 10:19:26.408099 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:19:26.410301 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:19:26.412499 systemd[1]: Starting modprobe@loop.service... May 15 10:19:26.413434 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:19:26.413578 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:19:26.414368 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:19:26.414507 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:19:26.415000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:26.415000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:26.416058 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:19:26.416218 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:19:26.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:26.417000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:26.417722 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:19:26.417832 systemd[1]: Finished modprobe@loop.service. May 15 10:19:26.418000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:26.418000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:26.419368 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 10:19:26.419471 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 10:19:26.482964 ldconfig[1068]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 15 10:19:26.486538 systemd[1]: Finished ldconfig.service. May 15 10:19:26.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:26.524104 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 15 10:19:26.526465 systemd[1]: Mounting boot.mount... May 15 10:19:26.528575 systemd[1]: Mounting usr-share-oem.mount... May 15 10:19:26.534774 systemd[1]: Mounted boot.mount. May 15 10:19:26.535726 systemd[1]: Mounted usr-share-oem.mount. May 15 10:19:26.537702 systemd[1]: Finished systemd-sysext.service. May 15 10:19:26.538000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:26.540813 systemd[1]: Starting ensure-sysext.service... May 15 10:19:26.542794 systemd[1]: Starting systemd-tmpfiles-setup.service... May 15 10:19:26.545940 systemd[1]: Finished systemd-boot-update.service. May 15 10:19:26.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:26.548649 systemd[1]: Reloading. May 15 10:19:26.552236 systemd-tmpfiles[1090]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 15 10:19:26.553313 systemd-tmpfiles[1090]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 15 10:19:26.554629 systemd-tmpfiles[1090]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 15 10:19:26.584459 /usr/lib/systemd/system-generators/torcx-generator[1110]: time="2025-05-15T10:19:26Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 10:19:26.584490 /usr/lib/systemd/system-generators/torcx-generator[1110]: time="2025-05-15T10:19:26Z" level=info msg="torcx already run" May 15 10:19:26.644882 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 10:19:26.644903 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 10:19:26.660102 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 10:19:26.700000 audit: BPF prog-id=30 op=LOAD May 15 10:19:26.700000 audit: BPF prog-id=21 op=UNLOAD May 15 10:19:26.700000 audit: BPF prog-id=31 op=LOAD May 15 10:19:26.700000 audit: BPF prog-id=32 op=LOAD May 15 10:19:26.700000 audit: BPF prog-id=22 op=UNLOAD May 15 10:19:26.700000 audit: BPF prog-id=23 op=UNLOAD May 15 10:19:26.702000 audit: BPF prog-id=33 op=LOAD May 15 10:19:26.702000 audit: BPF prog-id=27 op=UNLOAD May 15 10:19:26.702000 audit: BPF prog-id=34 op=LOAD May 15 10:19:26.702000 audit: BPF prog-id=35 op=LOAD May 15 10:19:26.702000 audit: BPF prog-id=28 op=UNLOAD May 15 10:19:26.702000 audit: BPF prog-id=29 op=UNLOAD May 15 10:19:26.703000 audit: BPF prog-id=36 op=LOAD May 15 10:19:26.703000 audit: BPF prog-id=37 op=LOAD May 15 10:19:26.703000 audit: BPF prog-id=24 op=UNLOAD May 15 10:19:26.703000 audit: BPF prog-id=25 op=UNLOAD May 15 10:19:26.704000 audit: BPF prog-id=38 op=LOAD May 15 10:19:26.704000 audit: BPF prog-id=26 op=UNLOAD May 15 10:19:26.706057 systemd[1]: Finished systemd-tmpfiles-setup.service. May 15 10:19:26.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:26.710491 systemd[1]: Starting audit-rules.service... May 15 10:19:26.712582 systemd[1]: Starting clean-ca-certificates.service... May 15 10:19:26.714570 systemd[1]: Starting systemd-journal-catalog-update.service... May 15 10:19:26.717000 audit: BPF prog-id=39 op=LOAD May 15 10:19:26.718887 systemd[1]: Starting systemd-resolved.service... May 15 10:19:26.721000 audit: BPF prog-id=40 op=LOAD May 15 10:19:26.722368 systemd[1]: Starting systemd-timesyncd.service... May 15 10:19:26.724300 systemd[1]: Starting systemd-update-utmp.service... May 15 10:19:26.730732 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 10:19:26.733000 audit[1160]: SYSTEM_BOOT pid=1160 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 15 10:19:26.732022 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:19:26.734045 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:19:26.735989 systemd[1]: Starting modprobe@loop.service... May 15 10:19:26.736843 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:19:26.736972 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:19:26.737673 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:19:26.737798 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:19:26.738000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:26.738000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:26.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:26.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:26.741000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:26.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:26.743000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:26.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:26.739248 systemd[1]: Finished clean-ca-certificates.service. May 15 10:19:26.740597 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:19:26.740704 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:19:26.742179 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:19:26.742317 systemd[1]: Finished modprobe@loop.service. May 15 10:19:26.743561 systemd[1]: Finished systemd-journal-catalog-update.service. May 15 10:19:26.746531 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 10:19:26.746703 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 10:19:26.747995 systemd[1]: Starting systemd-update-done.service... May 15 10:19:26.749035 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 10:19:26.751351 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 10:19:26.752585 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:19:26.754469 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:19:26.756322 systemd[1]: Starting modprobe@loop.service... May 15 10:19:26.757093 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:19:26.757288 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:19:26.757396 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 10:19:26.758269 systemd[1]: Finished systemd-update-utmp.service. May 15 10:19:26.759000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:26.759561 systemd[1]: Finished systemd-update-done.service. May 15 10:19:26.760000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:26.760911 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:19:26.761029 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:19:26.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:26.761000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:26.762351 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:19:26.762462 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:19:26.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:26.763000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:26.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:26.764000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:26.763900 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:19:26.764003 systemd[1]: Finished modprobe@loop.service. May 15 10:19:26.767851 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 10:19:26.770411 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:19:26.772535 systemd[1]: Starting modprobe@drm.service... May 15 10:19:26.774428 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:19:26.776250 systemd[1]: Starting modprobe@loop.service... May 15 10:19:26.777066 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:19:26.777211 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:19:26.778374 systemd[1]: Starting systemd-networkd-wait-online.service... May 15 10:19:26.779496 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 10:19:26.780526 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:19:26.780656 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:19:26.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:26.781000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:26.782038 systemd[1]: modprobe@drm.service: Deactivated successfully. May 15 10:19:26.782163 systemd[1]: Finished modprobe@drm.service. May 15 10:19:26.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:26.782000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:26.783443 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:19:26.783551 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:19:26.783000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 15 10:19:26.783000 audit[1181]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff163ec20 a2=420 a3=0 items=0 ppid=1149 pid=1181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:26.783000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 15 10:19:26.784065 augenrules[1181]: No rules May 15 10:19:26.784849 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:19:26.784956 systemd[1]: Finished modprobe@loop.service. May 15 10:19:26.786174 systemd[1]: Started systemd-timesyncd.service. May 15 10:19:26.786336 systemd-timesyncd[1159]: Contacted time server 10.0.0.1:123 (10.0.0.1). May 15 10:19:26.786393 systemd-timesyncd[1159]: Initial clock synchronization to Thu 2025-05-15 10:19:26.736662 UTC. May 15 10:19:26.786961 systemd-resolved[1155]: Positive Trust Anchors: May 15 10:19:26.786971 systemd-resolved[1155]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 15 10:19:26.786997 systemd-resolved[1155]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 15 10:19:26.787744 systemd[1]: Finished audit-rules.service. May 15 10:19:26.789242 systemd[1]: Reached target time-set.target. May 15 10:19:26.790142 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 10:19:26.790204 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 10:19:26.790480 systemd[1]: Finished ensure-sysext.service. May 15 10:19:26.796919 systemd-resolved[1155]: Defaulting to hostname 'linux'. May 15 10:19:26.800002 systemd[1]: Started systemd-resolved.service. May 15 10:19:26.800921 systemd[1]: Reached target network.target. May 15 10:19:26.801819 systemd[1]: Reached target nss-lookup.target. May 15 10:19:26.802664 systemd[1]: Reached target sysinit.target. May 15 10:19:26.803547 systemd[1]: Started motdgen.path. May 15 10:19:26.804303 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 15 10:19:26.805556 systemd[1]: Started logrotate.timer. May 15 10:19:26.806404 systemd[1]: Started mdadm.timer. May 15 10:19:26.807091 systemd[1]: Started systemd-tmpfiles-clean.timer. May 15 10:19:26.807987 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 15 10:19:26.808016 systemd[1]: Reached target paths.target. May 15 10:19:26.808796 systemd[1]: Reached target timers.target. May 15 10:19:26.809936 systemd[1]: Listening on dbus.socket. May 15 10:19:26.811702 systemd[1]: Starting docker.socket... May 15 10:19:26.814986 systemd[1]: Listening on sshd.socket. May 15 10:19:26.815881 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:19:26.816315 systemd[1]: Listening on docker.socket. May 15 10:19:26.817133 systemd[1]: Reached target sockets.target. May 15 10:19:26.817966 systemd[1]: Reached target basic.target. May 15 10:19:26.818803 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 15 10:19:26.818834 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 15 10:19:26.819788 systemd[1]: Starting containerd.service... May 15 10:19:26.821514 systemd[1]: Starting dbus.service... May 15 10:19:26.823294 systemd[1]: Starting enable-oem-cloudinit.service... May 15 10:19:26.825324 systemd[1]: Starting extend-filesystems.service... May 15 10:19:26.826286 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 15 10:19:26.827384 systemd[1]: Starting motdgen.service... May 15 10:19:26.828497 jq[1191]: false May 15 10:19:26.829128 systemd[1]: Starting ssh-key-proc-cmdline.service... May 15 10:19:26.830982 systemd[1]: Starting sshd-keygen.service... May 15 10:19:26.833638 systemd[1]: Starting systemd-logind.service... May 15 10:19:26.834486 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:19:26.834553 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 15 10:19:26.834973 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 15 10:19:26.835613 systemd[1]: Starting update-engine.service... May 15 10:19:26.838343 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 15 10:19:26.840877 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 15 10:19:26.841049 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 15 10:19:26.841160 jq[1208]: true May 15 10:19:26.844317 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 15 10:19:26.844482 systemd[1]: Finished ssh-key-proc-cmdline.service. May 15 10:19:26.851743 jq[1211]: true May 15 10:19:26.854258 systemd[1]: motdgen.service: Deactivated successfully. May 15 10:19:26.854430 systemd[1]: Finished motdgen.service. May 15 10:19:26.866475 dbus-daemon[1190]: [system] SELinux support is enabled May 15 10:19:26.868270 systemd[1]: Started dbus.service. May 15 10:19:26.870478 extend-filesystems[1192]: Found loop1 May 15 10:19:26.871515 extend-filesystems[1192]: Found vda May 15 10:19:26.871515 extend-filesystems[1192]: Found vda1 May 15 10:19:26.871515 extend-filesystems[1192]: Found vda2 May 15 10:19:26.871515 extend-filesystems[1192]: Found vda3 May 15 10:19:26.871515 extend-filesystems[1192]: Found usr May 15 10:19:26.871515 extend-filesystems[1192]: Found vda4 May 15 10:19:26.871515 extend-filesystems[1192]: Found vda6 May 15 10:19:26.871515 extend-filesystems[1192]: Found vda7 May 15 10:19:26.871515 extend-filesystems[1192]: Found vda9 May 15 10:19:26.871515 extend-filesystems[1192]: Checking size of /dev/vda9 May 15 10:19:26.870826 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 15 10:19:26.870849 systemd[1]: Reached target system-config.target. May 15 10:19:26.872373 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 15 10:19:26.872388 systemd[1]: Reached target user-config.target. May 15 10:19:26.894013 systemd-logind[1200]: Watching system buttons on /dev/input/event0 (Power Button) May 15 10:19:26.894480 systemd-logind[1200]: New seat seat0. May 15 10:19:26.900410 systemd[1]: Started systemd-logind.service. May 15 10:19:26.905570 extend-filesystems[1192]: Resized partition /dev/vda9 May 15 10:19:26.910654 extend-filesystems[1237]: resize2fs 1.46.5 (30-Dec-2021) May 15 10:19:26.913871 bash[1233]: Updated "/home/core/.ssh/authorized_keys" May 15 10:19:26.914937 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 15 10:19:26.919247 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks May 15 10:19:26.938833 update_engine[1203]: I0515 10:19:26.938483 1203 main.cc:92] Flatcar Update Engine starting May 15 10:19:26.941281 systemd[1]: Started update-engine.service. May 15 10:19:26.943169 update_engine[1203]: I0515 10:19:26.942948 1203 update_check_scheduler.cc:74] Next update check in 3m37s May 15 10:19:26.944001 systemd[1]: Started locksmithd.service. May 15 10:19:26.951371 env[1212]: time="2025-05-15T10:19:26.951310760Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 15 10:19:26.957225 kernel: EXT4-fs (vda9): resized filesystem to 1864699 May 15 10:19:26.977830 env[1212]: time="2025-05-15T10:19:26.969322800Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 15 10:19:26.978023 env[1212]: time="2025-05-15T10:19:26.977989120Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 15 10:19:26.978056 extend-filesystems[1237]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 15 10:19:26.978056 extend-filesystems[1237]: old_desc_blocks = 1, new_desc_blocks = 1 May 15 10:19:26.978056 extend-filesystems[1237]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. May 15 10:19:26.982188 extend-filesystems[1192]: Resized filesystem in /dev/vda9 May 15 10:19:26.983044 env[1212]: time="2025-05-15T10:19:26.979319520Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.182-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 15 10:19:26.983044 env[1212]: time="2025-05-15T10:19:26.979346160Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 15 10:19:26.983044 env[1212]: time="2025-05-15T10:19:26.979553520Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 15 10:19:26.983044 env[1212]: time="2025-05-15T10:19:26.979569640Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 15 10:19:26.983044 env[1212]: time="2025-05-15T10:19:26.979581680Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 15 10:19:26.983044 env[1212]: time="2025-05-15T10:19:26.979591640Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 15 10:19:26.983044 env[1212]: time="2025-05-15T10:19:26.979658160Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 15 10:19:26.983044 env[1212]: time="2025-05-15T10:19:26.979820160Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 15 10:19:26.983044 env[1212]: time="2025-05-15T10:19:26.979949480Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 15 10:19:26.983044 env[1212]: time="2025-05-15T10:19:26.979964480Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 15 10:19:26.978804 systemd[1]: extend-filesystems.service: Deactivated successfully. May 15 10:19:26.983429 env[1212]: time="2025-05-15T10:19:26.980013560Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 15 10:19:26.983429 env[1212]: time="2025-05-15T10:19:26.980025360Z" level=info msg="metadata content store policy set" policy=shared May 15 10:19:26.978980 systemd[1]: Finished extend-filesystems.service. May 15 10:19:26.990188 env[1212]: time="2025-05-15T10:19:26.990104600Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 15 10:19:26.990188 env[1212]: time="2025-05-15T10:19:26.990153880Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 15 10:19:26.990188 env[1212]: time="2025-05-15T10:19:26.990168320Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 15 10:19:26.990294 env[1212]: time="2025-05-15T10:19:26.990219880Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 15 10:19:26.990294 env[1212]: time="2025-05-15T10:19:26.990239320Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 15 10:19:26.990294 env[1212]: time="2025-05-15T10:19:26.990253360Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 15 10:19:26.990294 env[1212]: time="2025-05-15T10:19:26.990266400Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 15 10:19:26.990642 env[1212]: time="2025-05-15T10:19:26.990608840Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 15 10:19:26.990642 env[1212]: time="2025-05-15T10:19:26.990637160Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 15 10:19:26.990694 env[1212]: time="2025-05-15T10:19:26.990651120Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 15 10:19:26.990694 env[1212]: time="2025-05-15T10:19:26.990663000Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 15 10:19:26.990694 env[1212]: time="2025-05-15T10:19:26.990675080Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 15 10:19:26.990823 env[1212]: time="2025-05-15T10:19:26.990783360Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 15 10:19:26.990884 env[1212]: time="2025-05-15T10:19:26.990866600Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 15 10:19:26.991098 env[1212]: time="2025-05-15T10:19:26.991080440Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 15 10:19:26.991161 env[1212]: time="2025-05-15T10:19:26.991117440Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 15 10:19:26.991161 env[1212]: time="2025-05-15T10:19:26.991133200Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 15 10:19:26.991299 env[1212]: time="2025-05-15T10:19:26.991255720Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 15 10:19:26.991299 env[1212]: time="2025-05-15T10:19:26.991274520Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 15 10:19:26.991299 env[1212]: time="2025-05-15T10:19:26.991286560Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 15 10:19:26.991299 env[1212]: time="2025-05-15T10:19:26.991297840Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 15 10:19:26.991384 env[1212]: time="2025-05-15T10:19:26.991309720Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 15 10:19:26.991384 env[1212]: time="2025-05-15T10:19:26.991322400Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 15 10:19:26.991384 env[1212]: time="2025-05-15T10:19:26.991335040Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 15 10:19:26.991384 env[1212]: time="2025-05-15T10:19:26.991346200Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 15 10:19:26.991384 env[1212]: time="2025-05-15T10:19:26.991358400Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 15 10:19:26.991509 env[1212]: time="2025-05-15T10:19:26.991472360Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 15 10:19:26.991509 env[1212]: time="2025-05-15T10:19:26.991492880Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 15 10:19:26.991509 env[1212]: time="2025-05-15T10:19:26.991505440Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 15 10:19:26.991571 env[1212]: time="2025-05-15T10:19:26.991516800Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 15 10:19:26.991571 env[1212]: time="2025-05-15T10:19:26.991531480Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 15 10:19:26.991571 env[1212]: time="2025-05-15T10:19:26.991542040Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 15 10:19:26.991571 env[1212]: time="2025-05-15T10:19:26.991557840Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 15 10:19:26.991651 env[1212]: time="2025-05-15T10:19:26.991590800Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 15 10:19:26.991830 env[1212]: time="2025-05-15T10:19:26.991779320Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 15 10:19:26.992660 env[1212]: time="2025-05-15T10:19:26.991838120Z" level=info msg="Connect containerd service" May 15 10:19:26.992660 env[1212]: time="2025-05-15T10:19:26.991867960Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 15 10:19:26.992660 env[1212]: time="2025-05-15T10:19:26.992512840Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 15 10:19:26.992854 env[1212]: time="2025-05-15T10:19:26.992754040Z" level=info msg="Start subscribing containerd event" May 15 10:19:26.992900 env[1212]: time="2025-05-15T10:19:26.992873680Z" level=info msg="Start recovering state" May 15 10:19:26.992900 env[1212]: time="2025-05-15T10:19:26.992892120Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 15 10:19:26.992943 env[1212]: time="2025-05-15T10:19:26.992932760Z" level=info msg=serving... address=/run/containerd/containerd.sock May 15 10:19:26.992992 env[1212]: time="2025-05-15T10:19:26.992942480Z" level=info msg="Start event monitor" May 15 10:19:26.993021 env[1212]: time="2025-05-15T10:19:26.992997960Z" level=info msg="containerd successfully booted in 0.042554s" May 15 10:19:26.993073 systemd[1]: Started containerd.service. May 15 10:19:26.995715 env[1212]: time="2025-05-15T10:19:26.994570640Z" level=info msg="Start snapshots syncer" May 15 10:19:26.995715 env[1212]: time="2025-05-15T10:19:26.994599320Z" level=info msg="Start cni network conf syncer for default" May 15 10:19:26.995715 env[1212]: time="2025-05-15T10:19:26.994613800Z" level=info msg="Start streaming server" May 15 10:19:27.011887 locksmithd[1241]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 15 10:19:27.507413 systemd-networkd[1041]: eth0: Gained IPv6LL May 15 10:19:27.509544 systemd[1]: Finished systemd-networkd-wait-online.service. May 15 10:19:27.510886 systemd[1]: Reached target network-online.target. May 15 10:19:27.513377 systemd[1]: Starting kubelet.service... May 15 10:19:28.069799 systemd[1]: Started kubelet.service. May 15 10:19:28.520362 kubelet[1254]: E0515 10:19:28.520250 1254 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 10:19:28.522099 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 10:19:28.522241 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 10:19:29.213093 sshd_keygen[1209]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 15 10:19:29.232723 systemd[1]: Finished sshd-keygen.service. May 15 10:19:29.235884 systemd[1]: Starting issuegen.service... May 15 10:19:29.240774 systemd[1]: issuegen.service: Deactivated successfully. May 15 10:19:29.240934 systemd[1]: Finished issuegen.service. May 15 10:19:29.243494 systemd[1]: Starting systemd-user-sessions.service... May 15 10:19:29.250750 systemd[1]: Finished systemd-user-sessions.service. May 15 10:19:29.253773 systemd[1]: Started getty@tty1.service. May 15 10:19:29.257113 systemd[1]: Started serial-getty@ttyAMA0.service. May 15 10:19:29.258593 systemd[1]: Reached target getty.target. May 15 10:19:29.259729 systemd[1]: Reached target multi-user.target. May 15 10:19:29.262066 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 15 10:19:29.269161 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 15 10:19:29.269364 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 15 10:19:29.270549 systemd[1]: Startup finished in 611ms (kernel) + 3.975s (initrd) + 5.720s (userspace) = 10.307s. May 15 10:19:32.152136 systemd[1]: Created slice system-sshd.slice. May 15 10:19:32.153413 systemd[1]: Started sshd@0-10.0.0.90:22-10.0.0.1:42842.service. May 15 10:19:32.210900 sshd[1276]: Accepted publickey for core from 10.0.0.1 port 42842 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:19:32.213317 sshd[1276]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:19:32.221088 systemd[1]: Created slice user-500.slice. May 15 10:19:32.222302 systemd[1]: Starting user-runtime-dir@500.service... May 15 10:19:32.224249 systemd-logind[1200]: New session 1 of user core. May 15 10:19:32.233911 systemd[1]: Finished user-runtime-dir@500.service. May 15 10:19:32.235381 systemd[1]: Starting user@500.service... May 15 10:19:32.238492 (systemd)[1279]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 15 10:19:32.298363 systemd[1279]: Queued start job for default target default.target. May 15 10:19:32.298835 systemd[1279]: Reached target paths.target. May 15 10:19:32.298866 systemd[1279]: Reached target sockets.target. May 15 10:19:32.298876 systemd[1279]: Reached target timers.target. May 15 10:19:32.298886 systemd[1279]: Reached target basic.target. May 15 10:19:32.298921 systemd[1279]: Reached target default.target. May 15 10:19:32.298944 systemd[1279]: Startup finished in 54ms. May 15 10:19:32.299215 systemd[1]: Started user@500.service. May 15 10:19:32.300593 systemd[1]: Started session-1.scope. May 15 10:19:32.352973 systemd[1]: Started sshd@1-10.0.0.90:22-10.0.0.1:42854.service. May 15 10:19:32.396388 sshd[1288]: Accepted publickey for core from 10.0.0.1 port 42854 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:19:32.397625 sshd[1288]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:19:32.401541 systemd-logind[1200]: New session 2 of user core. May 15 10:19:32.402355 systemd[1]: Started session-2.scope. May 15 10:19:32.458694 sshd[1288]: pam_unix(sshd:session): session closed for user core May 15 10:19:32.461759 systemd[1]: sshd@1-10.0.0.90:22-10.0.0.1:42854.service: Deactivated successfully. May 15 10:19:32.462403 systemd[1]: session-2.scope: Deactivated successfully. May 15 10:19:32.463046 systemd-logind[1200]: Session 2 logged out. Waiting for processes to exit. May 15 10:19:32.464510 systemd[1]: Started sshd@2-10.0.0.90:22-10.0.0.1:42870.service. May 15 10:19:32.465224 systemd-logind[1200]: Removed session 2. May 15 10:19:32.498365 sshd[1294]: Accepted publickey for core from 10.0.0.1 port 42870 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:19:32.499910 sshd[1294]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:19:32.503136 systemd-logind[1200]: New session 3 of user core. May 15 10:19:32.503936 systemd[1]: Started session-3.scope. May 15 10:19:32.553750 sshd[1294]: pam_unix(sshd:session): session closed for user core May 15 10:19:32.556920 systemd[1]: sshd@2-10.0.0.90:22-10.0.0.1:42870.service: Deactivated successfully. May 15 10:19:32.557492 systemd[1]: session-3.scope: Deactivated successfully. May 15 10:19:32.557990 systemd-logind[1200]: Session 3 logged out. Waiting for processes to exit. May 15 10:19:32.559022 systemd[1]: Started sshd@3-10.0.0.90:22-10.0.0.1:33134.service. May 15 10:19:32.559691 systemd-logind[1200]: Removed session 3. May 15 10:19:32.592452 sshd[1300]: Accepted publickey for core from 10.0.0.1 port 33134 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:19:32.593589 sshd[1300]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:19:32.597038 systemd-logind[1200]: New session 4 of user core. May 15 10:19:32.597828 systemd[1]: Started session-4.scope. May 15 10:19:32.651865 sshd[1300]: pam_unix(sshd:session): session closed for user core May 15 10:19:32.654189 systemd[1]: sshd@3-10.0.0.90:22-10.0.0.1:33134.service: Deactivated successfully. May 15 10:19:32.654737 systemd[1]: session-4.scope: Deactivated successfully. May 15 10:19:32.655526 systemd-logind[1200]: Session 4 logged out. Waiting for processes to exit. May 15 10:19:32.656498 systemd[1]: Started sshd@4-10.0.0.90:22-10.0.0.1:33140.service. May 15 10:19:32.657133 systemd-logind[1200]: Removed session 4. May 15 10:19:32.689565 sshd[1306]: Accepted publickey for core from 10.0.0.1 port 33140 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:19:32.691002 sshd[1306]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:19:32.694494 systemd-logind[1200]: New session 5 of user core. May 15 10:19:32.695516 systemd[1]: Started session-5.scope. May 15 10:19:32.752589 sudo[1309]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 15 10:19:32.752813 sudo[1309]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 10:19:32.764588 dbus-daemon[1190]: avc: received setenforce notice (enforcing=1) May 15 10:19:32.766188 sudo[1309]: pam_unix(sudo:session): session closed for user root May 15 10:19:32.768263 sshd[1306]: pam_unix(sshd:session): session closed for user core May 15 10:19:32.771005 systemd[1]: sshd@4-10.0.0.90:22-10.0.0.1:33140.service: Deactivated successfully. May 15 10:19:32.771631 systemd[1]: session-5.scope: Deactivated successfully. May 15 10:19:32.772405 systemd-logind[1200]: Session 5 logged out. Waiting for processes to exit. May 15 10:19:32.773491 systemd[1]: Started sshd@5-10.0.0.90:22-10.0.0.1:33154.service. May 15 10:19:32.775887 systemd-logind[1200]: Removed session 5. May 15 10:19:32.807515 sshd[1313]: Accepted publickey for core from 10.0.0.1 port 33154 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:19:32.808781 sshd[1313]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:19:32.811904 systemd-logind[1200]: New session 6 of user core. May 15 10:19:32.812689 systemd[1]: Started session-6.scope. May 15 10:19:32.864175 sudo[1317]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 15 10:19:32.864496 sudo[1317]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 10:19:32.867087 sudo[1317]: pam_unix(sudo:session): session closed for user root May 15 10:19:32.871284 sudo[1316]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 15 10:19:32.871498 sudo[1316]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 10:19:32.879465 systemd[1]: Stopping audit-rules.service... May 15 10:19:32.879000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 15 10:19:32.880615 auditctl[1320]: No rules May 15 10:19:32.880969 systemd[1]: audit-rules.service: Deactivated successfully. May 15 10:19:32.881114 systemd[1]: Stopped audit-rules.service. May 15 10:19:32.882835 kernel: kauditd_printk_skb: 121 callbacks suppressed May 15 10:19:32.882878 kernel: audit: type=1305 audit(1747304372.879:209): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 15 10:19:32.882907 kernel: audit: type=1300 audit(1747304372.879:209): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffcff01380 a2=420 a3=0 items=0 ppid=1 pid=1320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:32.879000 audit[1320]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffcff01380 a2=420 a3=0 items=0 ppid=1 pid=1320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:32.882640 systemd[1]: Starting audit-rules.service... May 15 10:19:32.886471 kernel: audit: type=1327 audit(1747304372.879:209): proctitle=2F7362696E2F617564697463746C002D44 May 15 10:19:32.879000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 15 10:19:32.887513 kernel: audit: type=1131 audit(1747304372.879:210): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:32.879000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:32.901015 augenrules[1337]: No rules May 15 10:19:32.901873 systemd[1]: Finished audit-rules.service. May 15 10:19:32.900000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:32.904841 sudo[1316]: pam_unix(sudo:session): session closed for user root May 15 10:19:32.905363 kernel: audit: type=1130 audit(1747304372.900:211): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:32.905590 kernel: audit: type=1106 audit(1747304372.904:212): pid=1316 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:19:32.904000 audit[1316]: USER_END pid=1316 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:19:32.904000 audit[1316]: CRED_DISP pid=1316 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:19:32.911719 kernel: audit: type=1104 audit(1747304372.904:213): pid=1316 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:19:32.912106 sshd[1313]: pam_unix(sshd:session): session closed for user core May 15 10:19:32.911000 audit[1313]: USER_END pid=1313 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:32.915356 systemd[1]: Started sshd@6-10.0.0.90:22-10.0.0.1:33166.service. May 15 10:19:32.915766 systemd[1]: sshd@5-10.0.0.90:22-10.0.0.1:33154.service: Deactivated successfully. May 15 10:19:32.916477 systemd[1]: session-6.scope: Deactivated successfully. May 15 10:19:32.916974 systemd-logind[1200]: Session 6 logged out. Waiting for processes to exit. May 15 10:19:32.911000 audit[1313]: CRED_DISP pid=1313 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:32.920360 kernel: audit: type=1106 audit(1747304372.911:214): pid=1313 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:32.920428 kernel: audit: type=1104 audit(1747304372.911:215): pid=1313 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:32.917793 systemd-logind[1200]: Removed session 6. May 15 10:19:32.914000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.90:22-10.0.0.1:33166 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:32.923265 kernel: audit: type=1130 audit(1747304372.914:216): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.90:22-10.0.0.1:33166 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:32.914000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.90:22-10.0.0.1:33154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:32.948000 audit[1342]: USER_ACCT pid=1342 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:32.948514 sshd[1342]: Accepted publickey for core from 10.0.0.1 port 33166 ssh2: RSA SHA256:I/C30/eWBhvgAgcCboY0f9pk+vr1TzGX+qBjeoJjilE May 15 10:19:32.949000 audit[1342]: CRED_ACQ pid=1342 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:32.949000 audit[1342]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff5b71c20 a2=3 a3=1 items=0 ppid=1 pid=1342 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:32.949000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:19:32.949674 sshd[1342]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:19:32.953287 systemd-logind[1200]: New session 7 of user core. May 15 10:19:32.953679 systemd[1]: Started session-7.scope. May 15 10:19:32.957000 audit[1342]: USER_START pid=1342 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:32.958000 audit[1345]: CRED_ACQ pid=1345 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:33.005000 audit[1346]: USER_ACCT pid=1346 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:19:33.005329 sudo[1346]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 15 10:19:33.005000 audit[1346]: CRED_REFR pid=1346 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:19:33.005784 sudo[1346]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 10:19:33.007000 audit[1346]: USER_START pid=1346 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:19:33.017851 systemd[1]: Starting coreos-metadata.service... May 15 10:19:33.023000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:33.023000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:33.023957 systemd[1]: coreos-metadata.service: Deactivated successfully. May 15 10:19:33.024122 systemd[1]: Finished coreos-metadata.service. May 15 10:19:33.494549 systemd[1]: Stopped kubelet.service. May 15 10:19:33.493000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:33.493000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:33.496489 systemd[1]: Starting kubelet.service... May 15 10:19:33.516487 systemd[1]: Reloading. May 15 10:19:33.564925 /usr/lib/systemd/system-generators/torcx-generator[1406]: time="2025-05-15T10:19:33Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 10:19:33.564953 /usr/lib/systemd/system-generators/torcx-generator[1406]: time="2025-05-15T10:19:33Z" level=info msg="torcx already run" May 15 10:19:33.715406 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 10:19:33.715422 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 10:19:33.731025 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 10:19:33.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.777000 audit: BPF prog-id=46 op=LOAD May 15 10:19:33.777000 audit: BPF prog-id=40 op=UNLOAD May 15 10:19:33.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.777000 audit: BPF prog-id=47 op=LOAD May 15 10:19:33.777000 audit: BPF prog-id=44 op=UNLOAD May 15 10:19:33.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.778000 audit: BPF prog-id=48 op=LOAD May 15 10:19:33.778000 audit: BPF prog-id=30 op=UNLOAD May 15 10:19:33.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.778000 audit: BPF prog-id=49 op=LOAD May 15 10:19:33.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.779000 audit: BPF prog-id=50 op=LOAD May 15 10:19:33.779000 audit: BPF prog-id=31 op=UNLOAD May 15 10:19:33.779000 audit: BPF prog-id=32 op=UNLOAD May 15 10:19:33.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.781000 audit: BPF prog-id=51 op=LOAD May 15 10:19:33.781000 audit: BPF prog-id=33 op=UNLOAD May 15 10:19:33.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.781000 audit: BPF prog-id=52 op=LOAD May 15 10:19:33.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.781000 audit: BPF prog-id=53 op=LOAD May 15 10:19:33.781000 audit: BPF prog-id=34 op=UNLOAD May 15 10:19:33.781000 audit: BPF prog-id=35 op=UNLOAD May 15 10:19:33.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.782000 audit: BPF prog-id=54 op=LOAD May 15 10:19:33.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.782000 audit: BPF prog-id=55 op=LOAD May 15 10:19:33.782000 audit: BPF prog-id=36 op=UNLOAD May 15 10:19:33.782000 audit: BPF prog-id=37 op=UNLOAD May 15 10:19:33.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.784000 audit: BPF prog-id=56 op=LOAD May 15 10:19:33.784000 audit: BPF prog-id=41 op=UNLOAD May 15 10:19:33.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.784000 audit: BPF prog-id=57 op=LOAD May 15 10:19:33.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.784000 audit: BPF prog-id=58 op=LOAD May 15 10:19:33.784000 audit: BPF prog-id=42 op=UNLOAD May 15 10:19:33.784000 audit: BPF prog-id=43 op=UNLOAD May 15 10:19:33.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.785000 audit: BPF prog-id=59 op=LOAD May 15 10:19:33.785000 audit: BPF prog-id=38 op=UNLOAD May 15 10:19:33.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:33.785000 audit: BPF prog-id=60 op=LOAD May 15 10:19:33.785000 audit: BPF prog-id=39 op=UNLOAD May 15 10:19:33.795772 systemd[1]: Started kubelet.service. May 15 10:19:33.794000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:33.797326 systemd[1]: Stopping kubelet.service... May 15 10:19:33.797674 systemd[1]: kubelet.service: Deactivated successfully. May 15 10:19:33.797920 systemd[1]: Stopped kubelet.service. May 15 10:19:33.796000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:33.799589 systemd[1]: Starting kubelet.service... May 15 10:19:33.890460 systemd[1]: Started kubelet.service. May 15 10:19:33.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:33.925777 kubelet[1450]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 10:19:33.926142 kubelet[1450]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 15 10:19:33.926190 kubelet[1450]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 10:19:33.926357 kubelet[1450]: I0515 10:19:33.926323 1450 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 15 10:19:34.537137 kubelet[1450]: I0515 10:19:34.537015 1450 server.go:520] "Kubelet version" kubeletVersion="v1.32.0" May 15 10:19:34.537295 kubelet[1450]: I0515 10:19:34.537280 1450 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 15 10:19:34.537796 kubelet[1450]: I0515 10:19:34.537773 1450 server.go:954] "Client rotation is on, will bootstrap in background" May 15 10:19:34.585001 kubelet[1450]: I0515 10:19:34.583862 1450 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 15 10:19:34.594407 kubelet[1450]: E0515 10:19:34.594377 1450 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 15 10:19:34.594407 kubelet[1450]: I0515 10:19:34.594404 1450 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 15 10:19:34.596953 kubelet[1450]: I0515 10:19:34.596925 1450 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 15 10:19:34.598268 kubelet[1450]: I0515 10:19:34.598223 1450 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 15 10:19:34.598429 kubelet[1450]: I0515 10:19:34.598268 1450 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.0.0.90","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 15 10:19:34.598557 kubelet[1450]: I0515 10:19:34.598496 1450 topology_manager.go:138] "Creating topology manager with none policy" May 15 10:19:34.598557 kubelet[1450]: I0515 10:19:34.598504 1450 container_manager_linux.go:304] "Creating device plugin manager" May 15 10:19:34.598746 kubelet[1450]: I0515 10:19:34.598719 1450 state_mem.go:36] "Initialized new in-memory state store" May 15 10:19:34.601288 kubelet[1450]: I0515 10:19:34.601263 1450 kubelet.go:446] "Attempting to sync node with API server" May 15 10:19:34.601334 kubelet[1450]: I0515 10:19:34.601294 1450 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 15 10:19:34.601334 kubelet[1450]: I0515 10:19:34.601316 1450 kubelet.go:352] "Adding apiserver pod source" May 15 10:19:34.601334 kubelet[1450]: I0515 10:19:34.601328 1450 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 15 10:19:34.601545 kubelet[1450]: E0515 10:19:34.601521 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:19:34.601664 kubelet[1450]: E0515 10:19:34.601649 1450 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:19:34.608723 kubelet[1450]: I0515 10:19:34.608704 1450 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 15 10:19:34.609534 kubelet[1450]: I0515 10:19:34.609512 1450 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 15 10:19:34.609754 kubelet[1450]: W0515 10:19:34.609730 1450 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 15 10:19:34.610969 kubelet[1450]: I0515 10:19:34.610945 1450 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 15 10:19:34.611498 kubelet[1450]: I0515 10:19:34.611478 1450 server.go:1287] "Started kubelet" May 15 10:19:34.611911 kubelet[1450]: I0515 10:19:34.611841 1450 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 15 10:19:34.616000 audit[1450]: AVC avc: denied { mac_admin } for pid=1450 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:34.616000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:19:34.616000 audit[1450]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40008e0de0 a1=4000c5e348 a2=40008e0db0 a3=25 items=0 ppid=1 pid=1450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:34.616000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:19:34.616000 audit[1450]: AVC avc: denied { mac_admin } for pid=1450 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:34.616000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:19:34.616000 audit[1450]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000419100 a1=4000c5e360 a2=40008e0e70 a3=25 items=0 ppid=1 pid=1450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:34.616000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:19:34.617843 kubelet[1450]: I0515 10:19:34.617569 1450 kubelet.go:1513] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 15 10:19:34.617843 kubelet[1450]: I0515 10:19:34.617618 1450 kubelet.go:1517] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 15 10:19:34.617843 kubelet[1450]: I0515 10:19:34.617609 1450 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 15 10:19:34.617843 kubelet[1450]: I0515 10:19:34.617684 1450 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 15 10:19:34.618058 kubelet[1450]: I0515 10:19:34.618040 1450 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 15 10:19:34.618311 kubelet[1450]: I0515 10:19:34.618285 1450 server.go:490] "Adding debug handlers to kubelet server" May 15 10:19:34.619086 kubelet[1450]: I0515 10:19:34.619051 1450 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 15 10:19:34.621571 kubelet[1450]: I0515 10:19:34.621552 1450 volume_manager.go:297] "Starting Kubelet Volume Manager" May 15 10:19:34.622142 kubelet[1450]: E0515 10:19:34.622114 1450 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" May 15 10:19:34.625131 kubelet[1450]: I0515 10:19:34.625103 1450 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 15 10:19:34.625283 kubelet[1450]: I0515 10:19:34.625271 1450 reconciler.go:26] "Reconciler: start to sync state" May 15 10:19:34.626970 kubelet[1450]: I0515 10:19:34.626787 1450 factory.go:221] Registration of the systemd container factory successfully May 15 10:19:34.626970 kubelet[1450]: I0515 10:19:34.626882 1450 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 15 10:19:34.627109 kubelet[1450]: E0515 10:19:34.626639 1450 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.0.0.90.183fac1233339372 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.0.0.90,UID:10.0.0.90,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:10.0.0.90,},FirstTimestamp:2025-05-15 10:19:34.61144869 +0000 UTC m=+0.716950993,LastTimestamp:2025-05-15 10:19:34.61144869 +0000 UTC m=+0.716950993,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.0.0.90,}" May 15 10:19:34.627187 kubelet[1450]: W0515 10:19:34.627163 1450 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "10.0.0.90" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope May 15 10:19:34.627239 kubelet[1450]: E0515 10:19:34.627221 1450 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes \"10.0.0.90\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" May 15 10:19:34.627457 kubelet[1450]: W0515 10:19:34.627276 1450 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope May 15 10:19:34.627457 kubelet[1450]: E0515 10:19:34.627303 1450 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" May 15 10:19:34.628080 kubelet[1450]: I0515 10:19:34.628062 1450 factory.go:221] Registration of the containerd container factory successfully May 15 10:19:34.634219 kubelet[1450]: E0515 10:19:34.634175 1450 kubelet.go:1561] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 15 10:19:34.635952 kubelet[1450]: W0515 10:19:34.635922 1450 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope May 15 10:19:34.636060 kubelet[1450]: E0515 10:19:34.636038 1450 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User \"system:anonymous\" cannot list resource \"csidrivers\" in API group \"storage.k8s.io\" at the cluster scope" logger="UnhandledError" May 15 10:19:34.637576 kubelet[1450]: I0515 10:19:34.637552 1450 cpu_manager.go:221] "Starting CPU manager" policy="none" May 15 10:19:34.637576 kubelet[1450]: I0515 10:19:34.637568 1450 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 15 10:19:34.637669 kubelet[1450]: I0515 10:19:34.637586 1450 state_mem.go:36] "Initialized new in-memory state store" May 15 10:19:34.644976 kubelet[1450]: E0515 10:19:34.644901 1450 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.0.0.90\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" May 15 10:19:34.645149 kubelet[1450]: E0515 10:19:34.645044 1450 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.0.0.90.183fac12348e2cb4 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.0.0.90,UID:10.0.0.90,APIVersion:,ResourceVersion:,FieldPath:,},Reason:InvalidDiskCapacity,Message:invalid capacity 0 on image filesystem,Source:EventSource{Component:kubelet,Host:10.0.0.90,},FirstTimestamp:2025-05-15 10:19:34.63416338 +0000 UTC m=+0.739665603,LastTimestamp:2025-05-15 10:19:34.63416338 +0000 UTC m=+0.739665603,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.0.0.90,}" May 15 10:19:34.722664 kubelet[1450]: E0515 10:19:34.722620 1450 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" May 15 10:19:34.730000 audit[1466]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1466 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:34.730000 audit[1466]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffffd0c250 a2=0 a3=1 items=0 ppid=1450 pid=1466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:34.730000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 15 10:19:34.731000 audit[1471]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1471 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:34.731000 audit[1471]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=fffff51f44d0 a2=0 a3=1 items=0 ppid=1450 pid=1471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:34.731000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 15 10:19:34.752733 kubelet[1450]: I0515 10:19:34.752675 1450 policy_none.go:49] "None policy: Start" May 15 10:19:34.752733 kubelet[1450]: I0515 10:19:34.752708 1450 memory_manager.go:186] "Starting memorymanager" policy="None" May 15 10:19:34.752733 kubelet[1450]: I0515 10:19:34.752721 1450 state_mem.go:35] "Initializing new in-memory state store" May 15 10:19:34.733000 audit[1473]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1473 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:34.733000 audit[1473]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffcace5be0 a2=0 a3=1 items=0 ppid=1450 pid=1473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:34.733000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 10:19:34.762000 audit[1478]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1478 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:34.762000 audit[1478]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffdcf582d0 a2=0 a3=1 items=0 ppid=1450 pid=1478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:34.762000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 10:19:34.768524 systemd[1]: Created slice kubepods.slice. May 15 10:19:34.772541 systemd[1]: Created slice kubepods-burstable.slice. May 15 10:19:34.775330 systemd[1]: Created slice kubepods-besteffort.slice. May 15 10:19:34.784925 kubelet[1450]: I0515 10:19:34.784891 1450 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 15 10:19:34.784988 kubelet[1450]: I0515 10:19:34.784958 1450 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 15 10:19:34.783000 audit[1450]: AVC avc: denied { mac_admin } for pid=1450 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:34.783000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:19:34.783000 audit[1450]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000f2ab10 a1=4000f15710 a2=4000f2aae0 a3=25 items=0 ppid=1 pid=1450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:34.783000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:19:34.785224 kubelet[1450]: I0515 10:19:34.785062 1450 eviction_manager.go:189] "Eviction manager: starting control loop" May 15 10:19:34.785224 kubelet[1450]: I0515 10:19:34.785074 1450 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 15 10:19:34.786094 kubelet[1450]: I0515 10:19:34.785787 1450 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 15 10:19:34.786856 kubelet[1450]: E0515 10:19:34.786835 1450 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 15 10:19:34.786945 kubelet[1450]: E0515 10:19:34.786929 1450 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.90\" not found" May 15 10:19:34.799000 audit[1483]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1483 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:34.799000 audit[1483]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=fffff07a6240 a2=0 a3=1 items=0 ppid=1450 pid=1483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:34.799000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 15 10:19:34.802108 kubelet[1450]: I0515 10:19:34.801001 1450 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 15 10:19:34.803159 kubelet[1450]: I0515 10:19:34.803139 1450 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 15 10:19:34.801000 audit[1484]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1484 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:34.803319 kubelet[1450]: I0515 10:19:34.803306 1450 status_manager.go:227] "Starting to sync pod status with apiserver" May 15 10:19:34.801000 audit[1484]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffe4428790 a2=0 a3=1 items=0 ppid=1450 pid=1484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:34.801000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 15 10:19:34.801000 audit[1485]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1485 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:34.801000 audit[1485]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff56de2e0 a2=0 a3=1 items=0 ppid=1450 pid=1485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:34.801000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 15 10:19:34.803581 kubelet[1450]: I0515 10:19:34.803387 1450 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 15 10:19:34.803631 kubelet[1450]: I0515 10:19:34.803622 1450 kubelet.go:2388] "Starting kubelet main sync loop" May 15 10:19:34.803784 kubelet[1450]: E0515 10:19:34.803770 1450 kubelet.go:2412] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" May 15 10:19:34.803000 audit[1487]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=1487 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:34.803000 audit[1487]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffef278360 a2=0 a3=1 items=0 ppid=1450 pid=1487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:34.803000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 15 10:19:34.803000 audit[1486]: NETFILTER_CFG table=mangle:10 family=10 entries=1 op=nft_register_chain pid=1486 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:34.803000 audit[1486]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd4bf06f0 a2=0 a3=1 items=0 ppid=1450 pid=1486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:34.803000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 15 10:19:34.804000 audit[1488]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1488 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:34.804000 audit[1488]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcadd8cc0 a2=0 a3=1 items=0 ppid=1450 pid=1488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:34.804000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 15 10:19:34.805000 audit[1489]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=1489 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:34.805000 audit[1489]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffdf8c6ed0 a2=0 a3=1 items=0 ppid=1450 pid=1489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:34.805000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 15 10:19:34.806000 audit[1490]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1490 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:34.806000 audit[1490]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffffbcbdab0 a2=0 a3=1 items=0 ppid=1450 pid=1490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:34.806000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 15 10:19:34.848714 kubelet[1450]: E0515 10:19:34.848671 1450 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.0.0.90\" not found" node="10.0.0.90" May 15 10:19:34.886394 kubelet[1450]: I0515 10:19:34.886359 1450 kubelet_node_status.go:76] "Attempting to register node" node="10.0.0.90" May 15 10:19:34.901376 kubelet[1450]: I0515 10:19:34.901341 1450 kubelet_node_status.go:79] "Successfully registered node" node="10.0.0.90" May 15 10:19:34.901527 kubelet[1450]: E0515 10:19:34.901514 1450 kubelet_node_status.go:549] "Error updating node status, will retry" err="error getting node \"10.0.0.90\": node \"10.0.0.90\" not found" May 15 10:19:34.908181 kubelet[1450]: E0515 10:19:34.908125 1450 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" May 15 10:19:34.926477 sudo[1346]: pam_unix(sudo:session): session closed for user root May 15 10:19:34.926000 audit[1346]: USER_END pid=1346 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:19:34.926000 audit[1346]: CRED_DISP pid=1346 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:19:34.928424 sshd[1342]: pam_unix(sshd:session): session closed for user core May 15 10:19:34.929000 audit[1342]: USER_END pid=1342 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:34.929000 audit[1342]: CRED_DISP pid=1342 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:19:34.931296 systemd[1]: sshd@6-10.0.0.90:22-10.0.0.1:33166.service: Deactivated successfully. May 15 10:19:34.931000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.90:22-10.0.0.1:33166 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:19:34.931956 systemd[1]: session-7.scope: Deactivated successfully. May 15 10:19:34.932516 systemd-logind[1200]: Session 7 logged out. Waiting for processes to exit. May 15 10:19:34.933461 systemd-logind[1200]: Removed session 7. May 15 10:19:35.008472 kubelet[1450]: E0515 10:19:35.008434 1450 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" May 15 10:19:35.109257 kubelet[1450]: E0515 10:19:35.109152 1450 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" May 15 10:19:35.209776 kubelet[1450]: E0515 10:19:35.209733 1450 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" May 15 10:19:35.310376 kubelet[1450]: E0515 10:19:35.310330 1450 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" May 15 10:19:35.410949 kubelet[1450]: E0515 10:19:35.410816 1450 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" May 15 10:19:35.511333 kubelet[1450]: E0515 10:19:35.511301 1450 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" May 15 10:19:35.540827 kubelet[1450]: I0515 10:19:35.540782 1450 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" May 15 10:19:35.540978 kubelet[1450]: W0515 10:19:35.540933 1450 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 15 10:19:35.602209 kubelet[1450]: E0515 10:19:35.602169 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:19:35.611760 kubelet[1450]: E0515 10:19:35.611736 1450 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.0.0.90\" not found" May 15 10:19:35.712997 kubelet[1450]: I0515 10:19:35.712907 1450 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" May 15 10:19:35.713300 env[1212]: time="2025-05-15T10:19:35.713249468Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 15 10:19:35.713707 kubelet[1450]: I0515 10:19:35.713675 1450 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" May 15 10:19:36.603006 kubelet[1450]: E0515 10:19:36.602966 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:19:36.604086 kubelet[1450]: I0515 10:19:36.604065 1450 apiserver.go:52] "Watching apiserver" May 15 10:19:36.611618 kubelet[1450]: E0515 10:19:36.611578 1450 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qvt4t" podUID="31c432de-1a0c-4836-b61b-14048a8034b7" May 15 10:19:36.616095 systemd[1]: Created slice kubepods-besteffort-pode01ae396_cb88_4ad7_bd84_dfe764f8d85a.slice. May 15 10:19:36.625096 systemd[1]: Created slice kubepods-besteffort-podcbad5039_6a5e_4953_a8af_0271b172027b.slice. May 15 10:19:36.626110 kubelet[1450]: I0515 10:19:36.626079 1450 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 15 10:19:36.635969 kubelet[1450]: I0515 10:19:36.635923 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sqqs9\" (UniqueName: \"kubernetes.io/projected/31c432de-1a0c-4836-b61b-14048a8034b7-kube-api-access-sqqs9\") pod \"csi-node-driver-qvt4t\" (UID: \"31c432de-1a0c-4836-b61b-14048a8034b7\") " pod="calico-system/csi-node-driver-qvt4t" May 15 10:19:36.635969 kubelet[1450]: I0515 10:19:36.635970 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/cbad5039-6a5e-4953-a8af-0271b172027b-cni-log-dir\") pod \"calico-node-d2gqc\" (UID: \"cbad5039-6a5e-4953-a8af-0271b172027b\") " pod="calico-system/calico-node-d2gqc" May 15 10:19:36.636120 kubelet[1450]: I0515 10:19:36.636002 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/31c432de-1a0c-4836-b61b-14048a8034b7-kubelet-dir\") pod \"csi-node-driver-qvt4t\" (UID: \"31c432de-1a0c-4836-b61b-14048a8034b7\") " pod="calico-system/csi-node-driver-qvt4t" May 15 10:19:36.636120 kubelet[1450]: I0515 10:19:36.636019 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/cbad5039-6a5e-4953-a8af-0271b172027b-policysync\") pod \"calico-node-d2gqc\" (UID: \"cbad5039-6a5e-4953-a8af-0271b172027b\") " pod="calico-system/calico-node-d2gqc" May 15 10:19:36.636120 kubelet[1450]: I0515 10:19:36.636036 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/cbad5039-6a5e-4953-a8af-0271b172027b-var-run-calico\") pod \"calico-node-d2gqc\" (UID: \"cbad5039-6a5e-4953-a8af-0271b172027b\") " pod="calico-system/calico-node-d2gqc" May 15 10:19:36.636120 kubelet[1450]: I0515 10:19:36.636051 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/cbad5039-6a5e-4953-a8af-0271b172027b-var-lib-calico\") pod \"calico-node-d2gqc\" (UID: \"cbad5039-6a5e-4953-a8af-0271b172027b\") " pod="calico-system/calico-node-d2gqc" May 15 10:19:36.636120 kubelet[1450]: I0515 10:19:36.636066 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ghdcv\" (UniqueName: \"kubernetes.io/projected/cbad5039-6a5e-4953-a8af-0271b172027b-kube-api-access-ghdcv\") pod \"calico-node-d2gqc\" (UID: \"cbad5039-6a5e-4953-a8af-0271b172027b\") " pod="calico-system/calico-node-d2gqc" May 15 10:19:36.636257 kubelet[1450]: I0515 10:19:36.636085 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/31c432de-1a0c-4836-b61b-14048a8034b7-varrun\") pod \"csi-node-driver-qvt4t\" (UID: \"31c432de-1a0c-4836-b61b-14048a8034b7\") " pod="calico-system/csi-node-driver-qvt4t" May 15 10:19:36.636257 kubelet[1450]: I0515 10:19:36.636100 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/31c432de-1a0c-4836-b61b-14048a8034b7-registration-dir\") pod \"csi-node-driver-qvt4t\" (UID: \"31c432de-1a0c-4836-b61b-14048a8034b7\") " pod="calico-system/csi-node-driver-qvt4t" May 15 10:19:36.636257 kubelet[1450]: I0515 10:19:36.636116 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/cbad5039-6a5e-4953-a8af-0271b172027b-lib-modules\") pod \"calico-node-d2gqc\" (UID: \"cbad5039-6a5e-4953-a8af-0271b172027b\") " pod="calico-system/calico-node-d2gqc" May 15 10:19:36.636257 kubelet[1450]: I0515 10:19:36.636131 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/cbad5039-6a5e-4953-a8af-0271b172027b-xtables-lock\") pod \"calico-node-d2gqc\" (UID: \"cbad5039-6a5e-4953-a8af-0271b172027b\") " pod="calico-system/calico-node-d2gqc" May 15 10:19:36.636257 kubelet[1450]: I0515 10:19:36.636145 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/e01ae396-cb88-4ad7-bd84-dfe764f8d85a-kube-proxy\") pod \"kube-proxy-bb9l6\" (UID: \"e01ae396-cb88-4ad7-bd84-dfe764f8d85a\") " pod="kube-system/kube-proxy-bb9l6" May 15 10:19:36.636356 kubelet[1450]: I0515 10:19:36.636162 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ht8dk\" (UniqueName: \"kubernetes.io/projected/e01ae396-cb88-4ad7-bd84-dfe764f8d85a-kube-api-access-ht8dk\") pod \"kube-proxy-bb9l6\" (UID: \"e01ae396-cb88-4ad7-bd84-dfe764f8d85a\") " pod="kube-system/kube-proxy-bb9l6" May 15 10:19:36.636356 kubelet[1450]: I0515 10:19:36.636179 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/cbad5039-6a5e-4953-a8af-0271b172027b-tigera-ca-bundle\") pod \"calico-node-d2gqc\" (UID: \"cbad5039-6a5e-4953-a8af-0271b172027b\") " pod="calico-system/calico-node-d2gqc" May 15 10:19:36.636356 kubelet[1450]: I0515 10:19:36.636240 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/31c432de-1a0c-4836-b61b-14048a8034b7-socket-dir\") pod \"csi-node-driver-qvt4t\" (UID: \"31c432de-1a0c-4836-b61b-14048a8034b7\") " pod="calico-system/csi-node-driver-qvt4t" May 15 10:19:36.636356 kubelet[1450]: I0515 10:19:36.636258 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/cbad5039-6a5e-4953-a8af-0271b172027b-cni-net-dir\") pod \"calico-node-d2gqc\" (UID: \"cbad5039-6a5e-4953-a8af-0271b172027b\") " pod="calico-system/calico-node-d2gqc" May 15 10:19:36.636356 kubelet[1450]: I0515 10:19:36.636282 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/cbad5039-6a5e-4953-a8af-0271b172027b-flexvol-driver-host\") pod \"calico-node-d2gqc\" (UID: \"cbad5039-6a5e-4953-a8af-0271b172027b\") " pod="calico-system/calico-node-d2gqc" May 15 10:19:36.636455 kubelet[1450]: I0515 10:19:36.636299 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/e01ae396-cb88-4ad7-bd84-dfe764f8d85a-xtables-lock\") pod \"kube-proxy-bb9l6\" (UID: \"e01ae396-cb88-4ad7-bd84-dfe764f8d85a\") " pod="kube-system/kube-proxy-bb9l6" May 15 10:19:36.636455 kubelet[1450]: I0515 10:19:36.636314 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/e01ae396-cb88-4ad7-bd84-dfe764f8d85a-lib-modules\") pod \"kube-proxy-bb9l6\" (UID: \"e01ae396-cb88-4ad7-bd84-dfe764f8d85a\") " pod="kube-system/kube-proxy-bb9l6" May 15 10:19:36.636455 kubelet[1450]: I0515 10:19:36.636329 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/cbad5039-6a5e-4953-a8af-0271b172027b-node-certs\") pod \"calico-node-d2gqc\" (UID: \"cbad5039-6a5e-4953-a8af-0271b172027b\") " pod="calico-system/calico-node-d2gqc" May 15 10:19:36.636455 kubelet[1450]: I0515 10:19:36.636344 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/cbad5039-6a5e-4953-a8af-0271b172027b-cni-bin-dir\") pod \"calico-node-d2gqc\" (UID: \"cbad5039-6a5e-4953-a8af-0271b172027b\") " pod="calico-system/calico-node-d2gqc" May 15 10:19:36.739327 kubelet[1450]: I0515 10:19:36.739293 1450 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 15 10:19:36.739938 kubelet[1450]: E0515 10:19:36.739335 1450 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:36.740042 kubelet[1450]: W0515 10:19:36.740023 1450 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:36.740132 kubelet[1450]: E0515 10:19:36.740117 1450 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:36.743411 kubelet[1450]: E0515 10:19:36.743395 1450 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:36.743501 kubelet[1450]: W0515 10:19:36.743486 1450 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:36.743577 kubelet[1450]: E0515 10:19:36.743562 1450 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:36.750456 kubelet[1450]: E0515 10:19:36.750440 1450 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:36.750559 kubelet[1450]: W0515 10:19:36.750546 1450 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:36.750615 kubelet[1450]: E0515 10:19:36.750605 1450 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:36.752099 kubelet[1450]: E0515 10:19:36.752083 1450 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:36.752189 kubelet[1450]: W0515 10:19:36.752174 1450 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:36.752288 kubelet[1450]: E0515 10:19:36.752275 1450 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:36.754596 kubelet[1450]: E0515 10:19:36.754582 1450 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:19:36.754678 kubelet[1450]: W0515 10:19:36.754666 1450 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:19:36.754734 kubelet[1450]: E0515 10:19:36.754723 1450 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:19:36.926389 kubelet[1450]: E0515 10:19:36.925283 1450 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:36.927305 env[1212]: time="2025-05-15T10:19:36.926174305Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-bb9l6,Uid:e01ae396-cb88-4ad7-bd84-dfe764f8d85a,Namespace:kube-system,Attempt:0,}" May 15 10:19:36.927769 kubelet[1450]: E0515 10:19:36.927751 1450 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:36.928565 env[1212]: time="2025-05-15T10:19:36.928329400Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-d2gqc,Uid:cbad5039-6a5e-4953-a8af-0271b172027b,Namespace:calico-system,Attempt:0,}" May 15 10:19:37.571974 env[1212]: time="2025-05-15T10:19:37.571929300Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:37.575048 env[1212]: time="2025-05-15T10:19:37.574997743Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:37.575750 env[1212]: time="2025-05-15T10:19:37.575711221Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:37.576979 env[1212]: time="2025-05-15T10:19:37.576951162Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:37.580299 env[1212]: time="2025-05-15T10:19:37.580263168Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:37.582910 env[1212]: time="2025-05-15T10:19:37.582884978Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:37.585227 env[1212]: time="2025-05-15T10:19:37.585184553Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:37.585965 env[1212]: time="2025-05-15T10:19:37.585937088Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:37.604116 kubelet[1450]: E0515 10:19:37.604065 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:19:37.607328 env[1212]: time="2025-05-15T10:19:37.607239276Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:19:37.607328 env[1212]: time="2025-05-15T10:19:37.607282486Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:19:37.607328 env[1212]: time="2025-05-15T10:19:37.607293108Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:19:37.607762 env[1212]: time="2025-05-15T10:19:37.607702801Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d4a263f1223400b09803a3004bae9753495db619315e3bbe6e98130ec836439a pid=1522 runtime=io.containerd.runc.v2 May 15 10:19:37.608109 env[1212]: time="2025-05-15T10:19:37.608065451Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:19:37.608170 env[1212]: time="2025-05-15T10:19:37.608101632Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:19:37.608170 env[1212]: time="2025-05-15T10:19:37.608115409Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:19:37.608327 env[1212]: time="2025-05-15T10:19:37.608289686Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/389ffa7fe80f06e188c15a4ae7b3c533a98302f393d377d965e26d6514fcac24 pid=1521 runtime=io.containerd.runc.v2 May 15 10:19:37.627928 systemd[1]: Started cri-containerd-389ffa7fe80f06e188c15a4ae7b3c533a98302f393d377d965e26d6514fcac24.scope. May 15 10:19:37.630494 systemd[1]: Started cri-containerd-d4a263f1223400b09803a3004bae9753495db619315e3bbe6e98130ec836439a.scope. May 15 10:19:37.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.659000 audit: BPF prog-id=61 op=LOAD May 15 10:19:37.659000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.659000 audit[1541]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=1521 pid=1541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:37.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338396666613766653830663036653138386331356134616537623363 May 15 10:19:37.659000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.659000 audit[1541]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=1521 pid=1541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:37.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338396666613766653830663036653138386331356134616537623363 May 15 10:19:37.659000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.659000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.659000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.659000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.659000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.659000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.659000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.659000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.659000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.659000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.659000 audit: BPF prog-id=62 op=LOAD May 15 10:19:37.659000 audit[1541]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=1521 pid=1541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:37.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338396666613766653830663036653138386331356134616537623363 May 15 10:19:37.659000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.659000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.659000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.659000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.659000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.659000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.659000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.659000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.659000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.659000 audit: BPF prog-id=63 op=LOAD May 15 10:19:37.659000 audit[1541]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=1521 pid=1541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:37.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338396666613766653830663036653138386331356134616537623363 May 15 10:19:37.659000 audit: BPF prog-id=63 op=UNLOAD May 15 10:19:37.659000 audit: BPF prog-id=62 op=UNLOAD May 15 10:19:37.659000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.659000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.659000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.659000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.659000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.659000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.659000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.659000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.659000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.659000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.659000 audit: BPF prog-id=64 op=LOAD May 15 10:19:37.659000 audit[1541]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=1521 pid=1541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:37.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338396666613766653830663036653138386331356134616537623363 May 15 10:19:37.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.664000 audit: BPF prog-id=65 op=LOAD May 15 10:19:37.664000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.664000 audit[1542]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1522 pid=1542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:37.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434613236336631323233343030623039383033613330303462616539 May 15 10:19:37.664000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.664000 audit[1542]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1522 pid=1542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:37.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434613236336631323233343030623039383033613330303462616539 May 15 10:19:37.664000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.664000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.664000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.664000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.664000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.664000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.664000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.664000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.664000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.664000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.664000 audit: BPF prog-id=66 op=LOAD May 15 10:19:37.664000 audit[1542]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1522 pid=1542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:37.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434613236336631323233343030623039383033613330303462616539 May 15 10:19:37.664000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.664000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.664000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.664000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.664000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.664000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.664000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.664000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.664000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.664000 audit: BPF prog-id=67 op=LOAD May 15 10:19:37.664000 audit[1542]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1522 pid=1542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:37.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434613236336631323233343030623039383033613330303462616539 May 15 10:19:37.664000 audit: BPF prog-id=67 op=UNLOAD May 15 10:19:37.664000 audit: BPF prog-id=66 op=UNLOAD May 15 10:19:37.664000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.664000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.664000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.664000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.664000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.664000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.664000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.664000 audit[1542]: AVC avc: denied { perfmon } for pid=1542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.664000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.664000 audit[1542]: AVC avc: denied { bpf } for pid=1542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:37.664000 audit: BPF prog-id=68 op=LOAD May 15 10:19:37.664000 audit[1542]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1522 pid=1542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:37.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434613236336631323233343030623039383033613330303462616539 May 15 10:19:37.676558 env[1212]: time="2025-05-15T10:19:37.675514926Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-d2gqc,Uid:cbad5039-6a5e-4953-a8af-0271b172027b,Namespace:calico-system,Attempt:0,} returns sandbox id \"389ffa7fe80f06e188c15a4ae7b3c533a98302f393d377d965e26d6514fcac24\"" May 15 10:19:37.676655 kubelet[1450]: E0515 10:19:37.676491 1450 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:37.677192 env[1212]: time="2025-05-15T10:19:37.677159128Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-bb9l6,Uid:e01ae396-cb88-4ad7-bd84-dfe764f8d85a,Namespace:kube-system,Attempt:0,} returns sandbox id \"d4a263f1223400b09803a3004bae9753495db619315e3bbe6e98130ec836439a\"" May 15 10:19:37.677969 kubelet[1450]: E0515 10:19:37.677830 1450 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:37.678267 env[1212]: time="2025-05-15T10:19:37.678228107Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 15 10:19:37.746023 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount146951452.mount: Deactivated successfully. May 15 10:19:38.604704 kubelet[1450]: E0515 10:19:38.604646 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:19:38.804903 kubelet[1450]: E0515 10:19:38.804841 1450 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qvt4t" podUID="31c432de-1a0c-4836-b61b-14048a8034b7" May 15 10:19:39.126062 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1063630370.mount: Deactivated successfully. May 15 10:19:39.236946 env[1212]: time="2025-05-15T10:19:39.236893932Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:39.238013 env[1212]: time="2025-05-15T10:19:39.237988925Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:dd8e710a588cc6f5834c4d84f7e12458efae593d3dfe527ca9e757c89239ecb8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:39.239388 env[1212]: time="2025-05-15T10:19:39.239356488Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:39.240526 env[1212]: time="2025-05-15T10:19:39.240495219Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:39.241052 env[1212]: time="2025-05-15T10:19:39.241022025Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:dd8e710a588cc6f5834c4d84f7e12458efae593d3dfe527ca9e757c89239ecb8\"" May 15 10:19:39.242154 env[1212]: time="2025-05-15T10:19:39.242131597Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.4\"" May 15 10:19:39.244050 env[1212]: time="2025-05-15T10:19:39.244017937Z" level=info msg="CreateContainer within sandbox \"389ffa7fe80f06e188c15a4ae7b3c533a98302f393d377d965e26d6514fcac24\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 15 10:19:39.253588 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2654219294.mount: Deactivated successfully. May 15 10:19:39.257096 env[1212]: time="2025-05-15T10:19:39.257056119Z" level=info msg="CreateContainer within sandbox \"389ffa7fe80f06e188c15a4ae7b3c533a98302f393d377d965e26d6514fcac24\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"afcab0498870f58d90bb510f537b78fb2a906ddc0c87150fc024119d8e9b244b\"" May 15 10:19:39.257808 env[1212]: time="2025-05-15T10:19:39.257778445Z" level=info msg="StartContainer for \"afcab0498870f58d90bb510f537b78fb2a906ddc0c87150fc024119d8e9b244b\"" May 15 10:19:39.284047 systemd[1]: Started cri-containerd-afcab0498870f58d90bb510f537b78fb2a906ddc0c87150fc024119d8e9b244b.scope. May 15 10:19:39.303151 kernel: kauditd_printk_skb: 357 callbacks suppressed May 15 10:19:39.307063 kernel: audit: type=1400 audit(1747304379.298:461): avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:39.307111 kernel: audit: type=1300 audit(1747304379.298:461): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1521 pid=1594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:39.307136 kernel: audit: type=1327 audit(1747304379.298:461): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166636162303439383837306635386439306262353130663533376237 May 15 10:19:39.298000 audit[1594]: AVC avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:39.298000 audit[1594]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1521 pid=1594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:39.298000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166636162303439383837306635386439306262353130663533376237 May 15 10:19:39.302000 audit[1594]: AVC avc: denied { bpf } for pid=1594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:39.313360 kernel: audit: type=1400 audit(1747304379.302:462): avc: denied { bpf } for pid=1594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:39.313398 kernel: audit: type=1400 audit(1747304379.302:462): avc: denied { bpf } for pid=1594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:39.302000 audit[1594]: AVC avc: denied { bpf } for pid=1594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:39.302000 audit[1594]: AVC avc: denied { bpf } for pid=1594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:39.318567 kernel: audit: type=1400 audit(1747304379.302:462): avc: denied { bpf } for pid=1594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:39.302000 audit[1594]: AVC avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:39.321518 kernel: audit: type=1400 audit(1747304379.302:462): avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:39.302000 audit[1594]: AVC avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:39.324236 kernel: audit: type=1400 audit(1747304379.302:462): avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:39.302000 audit[1594]: AVC avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:39.327210 kernel: audit: type=1400 audit(1747304379.302:462): avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:39.330037 kernel: audit: type=1400 audit(1747304379.302:462): avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:39.302000 audit[1594]: AVC avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:39.302000 audit[1594]: AVC avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:39.302000 audit[1594]: AVC avc: denied { bpf } for pid=1594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:39.302000 audit[1594]: AVC avc: denied { bpf } for pid=1594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:39.302000 audit: BPF prog-id=69 op=LOAD May 15 10:19:39.302000 audit[1594]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1521 pid=1594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:39.302000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166636162303439383837306635386439306262353130663533376237 May 15 10:19:39.306000 audit[1594]: AVC avc: denied { bpf } for pid=1594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:39.306000 audit[1594]: AVC avc: denied { bpf } for pid=1594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:39.306000 audit[1594]: AVC avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:39.306000 audit[1594]: AVC avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:39.306000 audit[1594]: AVC avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:39.306000 audit[1594]: AVC avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:39.306000 audit[1594]: AVC avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:39.306000 audit[1594]: AVC avc: denied { bpf } for pid=1594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:39.306000 audit[1594]: AVC avc: denied { bpf } for pid=1594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:39.306000 audit: BPF prog-id=70 op=LOAD May 15 10:19:39.306000 audit[1594]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1521 pid=1594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:39.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166636162303439383837306635386439306262353130663533376237 May 15 10:19:39.309000 audit: BPF prog-id=70 op=UNLOAD May 15 10:19:39.309000 audit: BPF prog-id=69 op=UNLOAD May 15 10:19:39.309000 audit[1594]: AVC avc: denied { bpf } for pid=1594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:39.309000 audit[1594]: AVC avc: denied { bpf } for pid=1594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:39.309000 audit[1594]: AVC avc: denied { bpf } for pid=1594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:39.309000 audit[1594]: AVC avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:39.309000 audit[1594]: AVC avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:39.309000 audit[1594]: AVC avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:39.309000 audit[1594]: AVC avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:39.309000 audit[1594]: AVC avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:39.309000 audit[1594]: AVC avc: denied { bpf } for pid=1594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:39.309000 audit[1594]: AVC avc: denied { bpf } for pid=1594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:39.309000 audit: BPF prog-id=71 op=LOAD May 15 10:19:39.309000 audit[1594]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1521 pid=1594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:39.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166636162303439383837306635386439306262353130663533376237 May 15 10:19:39.339801 env[1212]: time="2025-05-15T10:19:39.339720541Z" level=info msg="StartContainer for \"afcab0498870f58d90bb510f537b78fb2a906ddc0c87150fc024119d8e9b244b\" returns successfully" May 15 10:19:39.349988 systemd[1]: cri-containerd-afcab0498870f58d90bb510f537b78fb2a906ddc0c87150fc024119d8e9b244b.scope: Deactivated successfully. May 15 10:19:39.355000 audit: BPF prog-id=71 op=UNLOAD May 15 10:19:39.397846 env[1212]: time="2025-05-15T10:19:39.396619475Z" level=info msg="shim disconnected" id=afcab0498870f58d90bb510f537b78fb2a906ddc0c87150fc024119d8e9b244b May 15 10:19:39.397846 env[1212]: time="2025-05-15T10:19:39.396671601Z" level=warning msg="cleaning up after shim disconnected" id=afcab0498870f58d90bb510f537b78fb2a906ddc0c87150fc024119d8e9b244b namespace=k8s.io May 15 10:19:39.397846 env[1212]: time="2025-05-15T10:19:39.396682026Z" level=info msg="cleaning up dead shim" May 15 10:19:39.406210 env[1212]: time="2025-05-15T10:19:39.406168011Z" level=warning msg="cleanup warnings time=\"2025-05-15T10:19:39Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1633 runtime=io.containerd.runc.v2\n" May 15 10:19:39.605211 kubelet[1450]: E0515 10:19:39.605159 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:19:39.813728 kubelet[1450]: E0515 10:19:39.813467 1450 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:40.083037 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-afcab0498870f58d90bb510f537b78fb2a906ddc0c87150fc024119d8e9b244b-rootfs.mount: Deactivated successfully. May 15 10:19:40.257580 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3303930327.mount: Deactivated successfully. May 15 10:19:40.606252 kubelet[1450]: E0515 10:19:40.606210 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:19:40.742889 env[1212]: time="2025-05-15T10:19:40.742831626Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:40.744168 env[1212]: time="2025-05-15T10:19:40.744125530Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:62c496efa595c8eb7d098e43430b2b94ad66812214759a7ea9daaaa1ed901fc7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:40.745547 env[1212]: time="2025-05-15T10:19:40.745515745Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:40.746848 env[1212]: time="2025-05-15T10:19:40.746810329Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:152638222ecf265eb8e5352e3c50e8fc520994e8ffcff1ee1490c975f7fc2b36,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:40.747241 env[1212]: time="2025-05-15T10:19:40.747210312Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.4\" returns image reference \"sha256:62c496efa595c8eb7d098e43430b2b94ad66812214759a7ea9daaaa1ed901fc7\"" May 15 10:19:40.748325 env[1212]: time="2025-05-15T10:19:40.748286269Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 15 10:19:40.749387 env[1212]: time="2025-05-15T10:19:40.749359629Z" level=info msg="CreateContainer within sandbox \"d4a263f1223400b09803a3004bae9753495db619315e3bbe6e98130ec836439a\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 15 10:19:40.758631 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3166518128.mount: Deactivated successfully. May 15 10:19:40.762218 env[1212]: time="2025-05-15T10:19:40.762173839Z" level=info msg="CreateContainer within sandbox \"d4a263f1223400b09803a3004bae9753495db619315e3bbe6e98130ec836439a\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"193eeb4343284186ab481b533d00e2ca7baaf3066924921dad96d5e45f7fb568\"" May 15 10:19:40.762618 env[1212]: time="2025-05-15T10:19:40.762575180Z" level=info msg="StartContainer for \"193eeb4343284186ab481b533d00e2ca7baaf3066924921dad96d5e45f7fb568\"" May 15 10:19:40.776159 systemd[1]: Started cri-containerd-193eeb4343284186ab481b533d00e2ca7baaf3066924921dad96d5e45f7fb568.scope. May 15 10:19:40.800000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:40.800000 audit[1657]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1522 pid=1657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:40.800000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139336565623433343332383431383661623438316235333364303065 May 15 10:19:40.800000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:40.800000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:40.800000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:40.800000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:40.800000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:40.800000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:40.800000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:40.800000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:40.800000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:40.800000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:40.800000 audit: BPF prog-id=72 op=LOAD May 15 10:19:40.800000 audit[1657]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1522 pid=1657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:40.800000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139336565623433343332383431383661623438316235333364303065 May 15 10:19:40.800000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:40.800000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:40.800000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:40.800000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:40.800000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:40.800000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:40.800000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:40.800000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:40.800000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:40.800000 audit: BPF prog-id=73 op=LOAD May 15 10:19:40.800000 audit[1657]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1522 pid=1657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:40.800000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139336565623433343332383431383661623438316235333364303065 May 15 10:19:40.800000 audit: BPF prog-id=73 op=UNLOAD May 15 10:19:40.800000 audit: BPF prog-id=72 op=UNLOAD May 15 10:19:40.800000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:40.800000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:40.800000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:40.800000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:40.800000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:40.800000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:40.800000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:40.800000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:40.800000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:40.800000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:40.800000 audit: BPF prog-id=74 op=LOAD May 15 10:19:40.800000 audit[1657]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1522 pid=1657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:40.800000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139336565623433343332383431383661623438316235333364303065 May 15 10:19:40.804612 kubelet[1450]: E0515 10:19:40.804248 1450 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qvt4t" podUID="31c432de-1a0c-4836-b61b-14048a8034b7" May 15 10:19:40.820480 env[1212]: time="2025-05-15T10:19:40.820387066Z" level=info msg="StartContainer for \"193eeb4343284186ab481b533d00e2ca7baaf3066924921dad96d5e45f7fb568\" returns successfully" May 15 10:19:41.005000 audit[1722]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1722 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:41.005000 audit[1722]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe1da0f80 a2=0 a3=1 items=0 ppid=1668 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:41.005000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 15 10:19:41.007000 audit[1721]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1721 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:41.007000 audit[1721]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff51037c0 a2=0 a3=1 items=0 ppid=1668 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:41.007000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 15 10:19:41.008000 audit[1723]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=1723 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:41.008000 audit[1723]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe95982d0 a2=0 a3=1 items=0 ppid=1668 pid=1723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:41.008000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 15 10:19:41.010000 audit[1724]: NETFILTER_CFG table=nat:17 family=10 entries=1 op=nft_register_chain pid=1724 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:41.010000 audit[1724]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc9289070 a2=0 a3=1 items=0 ppid=1668 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:41.010000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 15 10:19:41.010000 audit[1725]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=1725 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:41.010000 audit[1725]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe2dbe9b0 a2=0 a3=1 items=0 ppid=1668 pid=1725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:41.010000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 15 10:19:41.011000 audit[1726]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1726 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:41.011000 audit[1726]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff43d2a60 a2=0 a3=1 items=0 ppid=1668 pid=1726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:41.011000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 15 10:19:41.108000 audit[1727]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1727 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:41.108000 audit[1727]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffff98328f0 a2=0 a3=1 items=0 ppid=1668 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:41.108000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 15 10:19:41.112000 audit[1729]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1729 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:41.112000 audit[1729]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffcfb2d280 a2=0 a3=1 items=0 ppid=1668 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:41.112000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 15 10:19:41.115000 audit[1732]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1732 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:41.115000 audit[1732]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffedbf9480 a2=0 a3=1 items=0 ppid=1668 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:41.115000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 15 10:19:41.116000 audit[1733]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1733 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:41.116000 audit[1733]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff108ae70 a2=0 a3=1 items=0 ppid=1668 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:41.116000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 15 10:19:41.118000 audit[1735]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1735 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:41.118000 audit[1735]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe4b1caf0 a2=0 a3=1 items=0 ppid=1668 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:41.118000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 15 10:19:41.119000 audit[1736]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1736 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:41.119000 audit[1736]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdfabf400 a2=0 a3=1 items=0 ppid=1668 pid=1736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:41.119000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 15 10:19:41.121000 audit[1738]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1738 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:41.121000 audit[1738]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd60708f0 a2=0 a3=1 items=0 ppid=1668 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:41.121000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 15 10:19:41.124000 audit[1741]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1741 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:41.124000 audit[1741]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd79b29c0 a2=0 a3=1 items=0 ppid=1668 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:41.124000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 15 10:19:41.125000 audit[1742]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1742 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:41.125000 audit[1742]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc8646b20 a2=0 a3=1 items=0 ppid=1668 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:41.125000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 15 10:19:41.128000 audit[1744]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1744 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:41.128000 audit[1744]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc9acd490 a2=0 a3=1 items=0 ppid=1668 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:41.128000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 15 10:19:41.129000 audit[1745]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1745 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:41.129000 audit[1745]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc1408770 a2=0 a3=1 items=0 ppid=1668 pid=1745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:41.129000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 15 10:19:41.131000 audit[1747]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1747 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:41.131000 audit[1747]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc0704440 a2=0 a3=1 items=0 ppid=1668 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:41.131000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 10:19:41.134000 audit[1750]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1750 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:41.134000 audit[1750]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffec656940 a2=0 a3=1 items=0 ppid=1668 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:41.134000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 10:19:41.137000 audit[1753]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1753 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:41.137000 audit[1753]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe453ead0 a2=0 a3=1 items=0 ppid=1668 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:41.137000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 15 10:19:41.138000 audit[1754]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1754 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:41.138000 audit[1754]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff6162e40 a2=0 a3=1 items=0 ppid=1668 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:41.138000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 15 10:19:41.140000 audit[1756]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1756 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:41.140000 audit[1756]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffc8e0f760 a2=0 a3=1 items=0 ppid=1668 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:41.140000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 10:19:41.167000 audit[1760]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1760 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:41.167000 audit[1760]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffd608ae80 a2=0 a3=1 items=0 ppid=1668 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:41.167000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 10:19:41.169000 audit[1761]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1761 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:41.169000 audit[1761]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe83d9ff0 a2=0 a3=1 items=0 ppid=1668 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:41.169000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 15 10:19:41.170000 audit[1763]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1763 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:19:41.170000 audit[1763]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=fffffe805340 a2=0 a3=1 items=0 ppid=1668 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:41.170000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 15 10:19:41.191000 audit[1769]: NETFILTER_CFG table=filter:39 family=2 entries=9 op=nft_register_rule pid=1769 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:19:41.191000 audit[1769]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffc454a3a0 a2=0 a3=1 items=0 ppid=1668 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:41.191000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:19:41.212000 audit[1769]: NETFILTER_CFG table=nat:40 family=2 entries=21 op=nft_register_chain pid=1769 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:19:41.212000 audit[1769]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9084 a0=3 a1=ffffc454a3a0 a2=0 a3=1 items=0 ppid=1668 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:41.212000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:19:41.213000 audit[1776]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1776 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:41.213000 audit[1776]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffdc3489d0 a2=0 a3=1 items=0 ppid=1668 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:41.213000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 15 10:19:41.215000 audit[1778]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1778 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:41.215000 audit[1778]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffc936c920 a2=0 a3=1 items=0 ppid=1668 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:41.215000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 15 10:19:41.218000 audit[1781]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1781 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:41.218000 audit[1781]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffd67baed0 a2=0 a3=1 items=0 ppid=1668 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:41.218000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 15 10:19:41.219000 audit[1782]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1782 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:41.219000 audit[1782]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe73c3bb0 a2=0 a3=1 items=0 ppid=1668 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:41.219000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 15 10:19:41.221000 audit[1784]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1784 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:41.221000 audit[1784]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc67ace30 a2=0 a3=1 items=0 ppid=1668 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:41.221000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 15 10:19:41.222000 audit[1785]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1785 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:41.222000 audit[1785]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe10c7870 a2=0 a3=1 items=0 ppid=1668 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:41.222000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 15 10:19:41.224000 audit[1787]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1787 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:41.224000 audit[1787]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffffb99aaa0 a2=0 a3=1 items=0 ppid=1668 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:41.224000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 15 10:19:41.227000 audit[1790]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1790 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:41.227000 audit[1790]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffdcd0b050 a2=0 a3=1 items=0 ppid=1668 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:41.227000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 15 10:19:41.228000 audit[1791]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1791 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:41.228000 audit[1791]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc10558c0 a2=0 a3=1 items=0 ppid=1668 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:41.228000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 15 10:19:41.230000 audit[1793]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1793 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:41.230000 audit[1793]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd34e2f70 a2=0 a3=1 items=0 ppid=1668 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:41.230000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 15 10:19:41.231000 audit[1794]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1794 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:41.231000 audit[1794]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff967f310 a2=0 a3=1 items=0 ppid=1668 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:41.231000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 15 10:19:41.233000 audit[1796]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1796 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:41.233000 audit[1796]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffae5d710 a2=0 a3=1 items=0 ppid=1668 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:41.233000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 10:19:41.236000 audit[1799]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1799 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:41.236000 audit[1799]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffcde640e0 a2=0 a3=1 items=0 ppid=1668 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:41.236000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 15 10:19:41.240000 audit[1802]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1802 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:41.240000 audit[1802]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff0188cf0 a2=0 a3=1 items=0 ppid=1668 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:41.240000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 15 10:19:41.241000 audit[1803]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1803 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:41.241000 audit[1803]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffcd7cc900 a2=0 a3=1 items=0 ppid=1668 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:41.241000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 15 10:19:41.243000 audit[1805]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1805 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:41.243000 audit[1805]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=fffffe3d2510 a2=0 a3=1 items=0 ppid=1668 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:41.243000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 10:19:41.246000 audit[1808]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1808 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:41.246000 audit[1808]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffdf4bd3f0 a2=0 a3=1 items=0 ppid=1668 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:41.246000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 10:19:41.247000 audit[1809]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1809 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:41.247000 audit[1809]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdfc040b0 a2=0 a3=1 items=0 ppid=1668 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:41.247000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 15 10:19:41.249000 audit[1811]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1811 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:41.249000 audit[1811]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=fffff77615d0 a2=0 a3=1 items=0 ppid=1668 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:41.249000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 15 10:19:41.250000 audit[1812]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1812 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:41.250000 audit[1812]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd9cebf00 a2=0 a3=1 items=0 ppid=1668 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:41.250000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 15 10:19:41.252000 audit[1814]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1814 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:41.252000 audit[1814]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd0ca6890 a2=0 a3=1 items=0 ppid=1668 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:41.252000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 10:19:41.254000 audit[1817]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1817 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:19:41.254000 audit[1817]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd5c15210 a2=0 a3=1 items=0 ppid=1668 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:41.254000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 10:19:41.257000 audit[1819]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1819 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 15 10:19:41.257000 audit[1819]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2088 a0=3 a1=ffffcd7b0300 a2=0 a3=1 items=0 ppid=1668 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:41.257000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:19:41.257000 audit[1819]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1819 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 15 10:19:41.257000 audit[1819]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffcd7b0300 a2=0 a3=1 items=0 ppid=1668 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:41.257000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:19:41.606459 kubelet[1450]: E0515 10:19:41.606344 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:19:41.823925 kubelet[1450]: E0515 10:19:41.823866 1450 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:41.848674 kubelet[1450]: I0515 10:19:41.848613 1450 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-bb9l6" podStartSLOduration=4.77899154 podStartE2EDuration="7.848597061s" podCreationTimestamp="2025-05-15 10:19:34 +0000 UTC" firstStartedPulling="2025-05-15 10:19:37.678477901 +0000 UTC m=+3.783980123" lastFinishedPulling="2025-05-15 10:19:40.748083421 +0000 UTC m=+6.853585644" observedRunningTime="2025-05-15 10:19:41.848258367 +0000 UTC m=+7.953760630" watchObservedRunningTime="2025-05-15 10:19:41.848597061 +0000 UTC m=+7.954099284" May 15 10:19:42.606527 kubelet[1450]: E0515 10:19:42.606485 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:19:42.804418 kubelet[1450]: E0515 10:19:42.804380 1450 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qvt4t" podUID="31c432de-1a0c-4836-b61b-14048a8034b7" May 15 10:19:42.824902 kubelet[1450]: E0515 10:19:42.824876 1450 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:43.451382 env[1212]: time="2025-05-15T10:19:43.451337767Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:43.452579 env[1212]: time="2025-05-15T10:19:43.452553264Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:add6372545fb406bb017769f222d84c50549ce13e3b19f1fbaee3d8a4aaef627,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:43.453830 env[1212]: time="2025-05-15T10:19:43.453802044Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:43.455023 env[1212]: time="2025-05-15T10:19:43.454994566Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:43.455557 env[1212]: time="2025-05-15T10:19:43.455522023Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:add6372545fb406bb017769f222d84c50549ce13e3b19f1fbaee3d8a4aaef627\"" May 15 10:19:43.457660 env[1212]: time="2025-05-15T10:19:43.457629334Z" level=info msg="CreateContainer within sandbox \"389ffa7fe80f06e188c15a4ae7b3c533a98302f393d377d965e26d6514fcac24\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 15 10:19:43.467248 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount71632991.mount: Deactivated successfully. May 15 10:19:43.470466 env[1212]: time="2025-05-15T10:19:43.470417762Z" level=info msg="CreateContainer within sandbox \"389ffa7fe80f06e188c15a4ae7b3c533a98302f393d377d965e26d6514fcac24\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"ba92bd157df37523feb79f972ee67da67d611344547bd6c9f4f3d9b2173bfb2d\"" May 15 10:19:43.471098 env[1212]: time="2025-05-15T10:19:43.471067364Z" level=info msg="StartContainer for \"ba92bd157df37523feb79f972ee67da67d611344547bd6c9f4f3d9b2173bfb2d\"" May 15 10:19:43.488224 systemd[1]: Started cri-containerd-ba92bd157df37523feb79f972ee67da67d611344547bd6c9f4f3d9b2173bfb2d.scope. May 15 10:19:43.516000 audit[1829]: AVC avc: denied { perfmon } for pid=1829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.516000 audit[1829]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1521 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:43.516000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261393262643135376466333735323366656237396639373265653637 May 15 10:19:43.516000 audit[1829]: AVC avc: denied { bpf } for pid=1829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.516000 audit[1829]: AVC avc: denied { bpf } for pid=1829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.516000 audit[1829]: AVC avc: denied { bpf } for pid=1829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.516000 audit[1829]: AVC avc: denied { perfmon } for pid=1829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.516000 audit[1829]: AVC avc: denied { perfmon } for pid=1829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.516000 audit[1829]: AVC avc: denied { perfmon } for pid=1829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.516000 audit[1829]: AVC avc: denied { perfmon } for pid=1829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.516000 audit[1829]: AVC avc: denied { perfmon } for pid=1829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.516000 audit[1829]: AVC avc: denied { bpf } for pid=1829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.516000 audit[1829]: AVC avc: denied { bpf } for pid=1829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.516000 audit: BPF prog-id=75 op=LOAD May 15 10:19:43.516000 audit[1829]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1521 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:43.516000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261393262643135376466333735323366656237396639373265653637 May 15 10:19:43.516000 audit[1829]: AVC avc: denied { bpf } for pid=1829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.516000 audit[1829]: AVC avc: denied { bpf } for pid=1829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.516000 audit[1829]: AVC avc: denied { perfmon } for pid=1829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.516000 audit[1829]: AVC avc: denied { perfmon } for pid=1829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.516000 audit[1829]: AVC avc: denied { perfmon } for pid=1829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.516000 audit[1829]: AVC avc: denied { perfmon } for pid=1829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.516000 audit[1829]: AVC avc: denied { perfmon } for pid=1829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.516000 audit[1829]: AVC avc: denied { bpf } for pid=1829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.516000 audit[1829]: AVC avc: denied { bpf } for pid=1829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.516000 audit: BPF prog-id=76 op=LOAD May 15 10:19:43.516000 audit[1829]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1521 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:43.516000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261393262643135376466333735323366656237396639373265653637 May 15 10:19:43.516000 audit: BPF prog-id=76 op=UNLOAD May 15 10:19:43.516000 audit: BPF prog-id=75 op=UNLOAD May 15 10:19:43.516000 audit[1829]: AVC avc: denied { bpf } for pid=1829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.516000 audit[1829]: AVC avc: denied { bpf } for pid=1829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.516000 audit[1829]: AVC avc: denied { bpf } for pid=1829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.516000 audit[1829]: AVC avc: denied { perfmon } for pid=1829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.516000 audit[1829]: AVC avc: denied { perfmon } for pid=1829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.516000 audit[1829]: AVC avc: denied { perfmon } for pid=1829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.516000 audit[1829]: AVC avc: denied { perfmon } for pid=1829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.516000 audit[1829]: AVC avc: denied { perfmon } for pid=1829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.516000 audit[1829]: AVC avc: denied { bpf } for pid=1829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.516000 audit[1829]: AVC avc: denied { bpf } for pid=1829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:43.516000 audit: BPF prog-id=77 op=LOAD May 15 10:19:43.516000 audit[1829]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1521 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:43.516000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261393262643135376466333735323366656237396639373265653637 May 15 10:19:43.531888 env[1212]: time="2025-05-15T10:19:43.531843160Z" level=info msg="StartContainer for \"ba92bd157df37523feb79f972ee67da67d611344547bd6c9f4f3d9b2173bfb2d\" returns successfully" May 15 10:19:43.607242 kubelet[1450]: E0515 10:19:43.607186 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:19:43.828346 kubelet[1450]: E0515 10:19:43.828251 1450 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:44.002557 env[1212]: time="2025-05-15T10:19:44.002506576Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 15 10:19:44.004459 systemd[1]: cri-containerd-ba92bd157df37523feb79f972ee67da67d611344547bd6c9f4f3d9b2173bfb2d.scope: Deactivated successfully. May 15 10:19:44.009000 audit: BPF prog-id=77 op=UNLOAD May 15 10:19:44.020684 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ba92bd157df37523feb79f972ee67da67d611344547bd6c9f4f3d9b2173bfb2d-rootfs.mount: Deactivated successfully. May 15 10:19:44.051881 kubelet[1450]: I0515 10:19:44.051848 1450 kubelet_node_status.go:502] "Fast updating node status as it just became ready" May 15 10:19:44.229343 env[1212]: time="2025-05-15T10:19:44.229223187Z" level=info msg="shim disconnected" id=ba92bd157df37523feb79f972ee67da67d611344547bd6c9f4f3d9b2173bfb2d May 15 10:19:44.229343 env[1212]: time="2025-05-15T10:19:44.229273934Z" level=warning msg="cleaning up after shim disconnected" id=ba92bd157df37523feb79f972ee67da67d611344547bd6c9f4f3d9b2173bfb2d namespace=k8s.io May 15 10:19:44.229343 env[1212]: time="2025-05-15T10:19:44.229284923Z" level=info msg="cleaning up dead shim" May 15 10:19:44.237168 env[1212]: time="2025-05-15T10:19:44.237122004Z" level=warning msg="cleanup warnings time=\"2025-05-15T10:19:44Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1870 runtime=io.containerd.runc.v2\n" May 15 10:19:44.608324 kubelet[1450]: E0515 10:19:44.608152 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:19:44.810802 systemd[1]: Created slice kubepods-besteffort-pod31c432de_1a0c_4836_b61b_14048a8034b7.slice. May 15 10:19:44.813319 env[1212]: time="2025-05-15T10:19:44.813285522Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qvt4t,Uid:31c432de-1a0c-4836-b61b-14048a8034b7,Namespace:calico-system,Attempt:0,}" May 15 10:19:44.836086 kubelet[1450]: E0515 10:19:44.834950 1450 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:44.836213 env[1212]: time="2025-05-15T10:19:44.835891942Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 15 10:19:44.950700 env[1212]: time="2025-05-15T10:19:44.950570620Z" level=error msg="Failed to destroy network for sandbox \"b09cb1ed9f4a03cb49bddff331d6929ff4b7bf633a8a441aaba4cfa99cb5410b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:19:44.952210 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-b09cb1ed9f4a03cb49bddff331d6929ff4b7bf633a8a441aaba4cfa99cb5410b-shm.mount: Deactivated successfully. May 15 10:19:44.952619 env[1212]: time="2025-05-15T10:19:44.952576862Z" level=error msg="encountered an error cleaning up failed sandbox \"b09cb1ed9f4a03cb49bddff331d6929ff4b7bf633a8a441aaba4cfa99cb5410b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:19:44.952744 env[1212]: time="2025-05-15T10:19:44.952717915Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qvt4t,Uid:31c432de-1a0c-4836-b61b-14048a8034b7,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b09cb1ed9f4a03cb49bddff331d6929ff4b7bf633a8a441aaba4cfa99cb5410b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:19:44.953251 kubelet[1450]: E0515 10:19:44.953187 1450 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b09cb1ed9f4a03cb49bddff331d6929ff4b7bf633a8a441aaba4cfa99cb5410b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:19:44.953403 kubelet[1450]: E0515 10:19:44.953269 1450 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b09cb1ed9f4a03cb49bddff331d6929ff4b7bf633a8a441aaba4cfa99cb5410b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-qvt4t" May 15 10:19:44.953403 kubelet[1450]: E0515 10:19:44.953302 1450 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b09cb1ed9f4a03cb49bddff331d6929ff4b7bf633a8a441aaba4cfa99cb5410b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-qvt4t" May 15 10:19:44.953403 kubelet[1450]: E0515 10:19:44.953348 1450 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-qvt4t_calico-system(31c432de-1a0c-4836-b61b-14048a8034b7)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-qvt4t_calico-system(31c432de-1a0c-4836-b61b-14048a8034b7)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b09cb1ed9f4a03cb49bddff331d6929ff4b7bf633a8a441aaba4cfa99cb5410b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-qvt4t" podUID="31c432de-1a0c-4836-b61b-14048a8034b7" May 15 10:19:45.392000 audit[1920]: NETFILTER_CFG table=filter:65 family=2 entries=16 op=nft_register_rule pid=1920 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:19:45.394709 kernel: kauditd_printk_skb: 274 callbacks suppressed May 15 10:19:45.394781 kernel: audit: type=1325 audit(1747304385.392:532): table=filter:65 family=2 entries=16 op=nft_register_rule pid=1920 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:19:45.392000 audit[1920]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffff682750 a2=0 a3=1 items=0 ppid=1668 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:45.400620 kernel: audit: type=1300 audit(1747304385.392:532): arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffff682750 a2=0 a3=1 items=0 ppid=1668 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:45.400676 kernel: audit: type=1327 audit(1747304385.392:532): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:19:45.392000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:19:45.407000 audit[1920]: NETFILTER_CFG table=nat:66 family=2 entries=14 op=nft_register_rule pid=1920 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:19:45.407000 audit[1920]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3468 a0=3 a1=ffffff682750 a2=0 a3=1 items=0 ppid=1668 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:45.414407 kernel: audit: type=1325 audit(1747304385.407:533): table=nat:66 family=2 entries=14 op=nft_register_rule pid=1920 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:19:45.414466 kernel: audit: type=1300 audit(1747304385.407:533): arch=c00000b7 syscall=211 success=yes exit=3468 a0=3 a1=ffffff682750 a2=0 a3=1 items=0 ppid=1668 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:45.414492 kernel: audit: type=1327 audit(1747304385.407:533): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:19:45.407000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:19:45.428000 audit[1924]: NETFILTER_CFG table=filter:67 family=2 entries=13 op=nft_register_rule pid=1924 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:19:45.428000 audit[1924]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=ffffcfbb9f30 a2=0 a3=1 items=0 ppid=1668 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:45.435103 kernel: audit: type=1325 audit(1747304385.428:534): table=filter:67 family=2 entries=13 op=nft_register_rule pid=1924 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:19:45.435166 kernel: audit: type=1300 audit(1747304385.428:534): arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=ffffcfbb9f30 a2=0 a3=1 items=0 ppid=1668 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:45.435187 kernel: audit: type=1327 audit(1747304385.428:534): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:19:45.428000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:19:45.437000 audit[1924]: NETFILTER_CFG table=nat:68 family=2 entries=35 op=nft_register_chain pid=1924 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:19:45.437000 audit[1924]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=ffffcfbb9f30 a2=0 a3=1 items=0 ppid=1668 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:45.437000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:19:45.441216 kernel: audit: type=1325 audit(1747304385.437:535): table=nat:68 family=2 entries=35 op=nft_register_chain pid=1924 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:19:45.608367 kubelet[1450]: E0515 10:19:45.608308 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:19:45.837465 kubelet[1450]: I0515 10:19:45.837378 1450 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b09cb1ed9f4a03cb49bddff331d6929ff4b7bf633a8a441aaba4cfa99cb5410b" May 15 10:19:45.838319 env[1212]: time="2025-05-15T10:19:45.838281547Z" level=info msg="StopPodSandbox for \"b09cb1ed9f4a03cb49bddff331d6929ff4b7bf633a8a441aaba4cfa99cb5410b\"" May 15 10:19:45.877379 env[1212]: time="2025-05-15T10:19:45.877320754Z" level=error msg="StopPodSandbox for \"b09cb1ed9f4a03cb49bddff331d6929ff4b7bf633a8a441aaba4cfa99cb5410b\" failed" error="failed to destroy network for sandbox \"b09cb1ed9f4a03cb49bddff331d6929ff4b7bf633a8a441aaba4cfa99cb5410b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:19:45.877805 kubelet[1450]: E0515 10:19:45.877749 1450 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b09cb1ed9f4a03cb49bddff331d6929ff4b7bf633a8a441aaba4cfa99cb5410b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b09cb1ed9f4a03cb49bddff331d6929ff4b7bf633a8a441aaba4cfa99cb5410b" May 15 10:19:45.877898 kubelet[1450]: E0515 10:19:45.877839 1450 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b09cb1ed9f4a03cb49bddff331d6929ff4b7bf633a8a441aaba4cfa99cb5410b"} May 15 10:19:45.877939 kubelet[1450]: E0515 10:19:45.877923 1450 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"31c432de-1a0c-4836-b61b-14048a8034b7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b09cb1ed9f4a03cb49bddff331d6929ff4b7bf633a8a441aaba4cfa99cb5410b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:19:45.877998 kubelet[1450]: E0515 10:19:45.877945 1450 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"31c432de-1a0c-4836-b61b-14048a8034b7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b09cb1ed9f4a03cb49bddff331d6929ff4b7bf633a8a441aaba4cfa99cb5410b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-qvt4t" podUID="31c432de-1a0c-4836-b61b-14048a8034b7" May 15 10:19:46.153874 systemd[1]: Created slice kubepods-besteffort-pod0fe06ad1_6af7_45a1_ba16_242227202423.slice. May 15 10:19:46.194359 kubelet[1450]: I0515 10:19:46.194311 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-j5xz8\" (UniqueName: \"kubernetes.io/projected/0fe06ad1-6af7-45a1-ba16-242227202423-kube-api-access-j5xz8\") pod \"nginx-deployment-7fcdb87857-t64sk\" (UID: \"0fe06ad1-6af7-45a1-ba16-242227202423\") " pod="default/nginx-deployment-7fcdb87857-t64sk" May 15 10:19:46.397000 audit[1950]: NETFILTER_CFG table=filter:69 family=2 entries=10 op=nft_register_rule pid=1950 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:19:46.397000 audit[1950]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=ffffcd71f590 a2=0 a3=1 items=0 ppid=1668 pid=1950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:46.397000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:19:46.403000 audit[1950]: NETFILTER_CFG table=nat:70 family=2 entries=44 op=nft_register_rule pid=1950 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:19:46.403000 audit[1950]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=ffffcd71f590 a2=0 a3=1 items=0 ppid=1668 pid=1950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:46.403000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:19:46.456750 env[1212]: time="2025-05-15T10:19:46.456698614Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-t64sk,Uid:0fe06ad1-6af7-45a1-ba16-242227202423,Namespace:default,Attempt:0,}" May 15 10:19:46.512231 env[1212]: time="2025-05-15T10:19:46.512158484Z" level=error msg="Failed to destroy network for sandbox \"526fc4ff353274034be35edf75f382257422cd48fd76d9656c2fc3dc6115910a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:19:46.512711 env[1212]: time="2025-05-15T10:19:46.512676852Z" level=error msg="encountered an error cleaning up failed sandbox \"526fc4ff353274034be35edf75f382257422cd48fd76d9656c2fc3dc6115910a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:19:46.512826 env[1212]: time="2025-05-15T10:19:46.512799740Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-t64sk,Uid:0fe06ad1-6af7-45a1-ba16-242227202423,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"526fc4ff353274034be35edf75f382257422cd48fd76d9656c2fc3dc6115910a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:19:46.513890 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-526fc4ff353274034be35edf75f382257422cd48fd76d9656c2fc3dc6115910a-shm.mount: Deactivated successfully. May 15 10:19:46.514035 kubelet[1450]: E0515 10:19:46.513996 1450 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"526fc4ff353274034be35edf75f382257422cd48fd76d9656c2fc3dc6115910a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:19:46.514091 kubelet[1450]: E0515 10:19:46.514063 1450 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"526fc4ff353274034be35edf75f382257422cd48fd76d9656c2fc3dc6115910a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-t64sk" May 15 10:19:46.514091 kubelet[1450]: E0515 10:19:46.514083 1450 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"526fc4ff353274034be35edf75f382257422cd48fd76d9656c2fc3dc6115910a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-t64sk" May 15 10:19:46.514147 kubelet[1450]: E0515 10:19:46.514119 1450 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-7fcdb87857-t64sk_default(0fe06ad1-6af7-45a1-ba16-242227202423)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-7fcdb87857-t64sk_default(0fe06ad1-6af7-45a1-ba16-242227202423)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"526fc4ff353274034be35edf75f382257422cd48fd76d9656c2fc3dc6115910a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-t64sk" podUID="0fe06ad1-6af7-45a1-ba16-242227202423" May 15 10:19:46.609025 kubelet[1450]: E0515 10:19:46.608975 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:19:46.840140 kubelet[1450]: I0515 10:19:46.840042 1450 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="526fc4ff353274034be35edf75f382257422cd48fd76d9656c2fc3dc6115910a" May 15 10:19:46.841016 env[1212]: time="2025-05-15T10:19:46.840670487Z" level=info msg="StopPodSandbox for \"526fc4ff353274034be35edf75f382257422cd48fd76d9656c2fc3dc6115910a\"" May 15 10:19:46.863239 env[1212]: time="2025-05-15T10:19:46.863161611Z" level=error msg="StopPodSandbox for \"526fc4ff353274034be35edf75f382257422cd48fd76d9656c2fc3dc6115910a\" failed" error="failed to destroy network for sandbox \"526fc4ff353274034be35edf75f382257422cd48fd76d9656c2fc3dc6115910a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:19:46.863444 kubelet[1450]: E0515 10:19:46.863404 1450 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"526fc4ff353274034be35edf75f382257422cd48fd76d9656c2fc3dc6115910a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="526fc4ff353274034be35edf75f382257422cd48fd76d9656c2fc3dc6115910a" May 15 10:19:46.863508 kubelet[1450]: E0515 10:19:46.863452 1450 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"526fc4ff353274034be35edf75f382257422cd48fd76d9656c2fc3dc6115910a"} May 15 10:19:46.863508 kubelet[1450]: E0515 10:19:46.863488 1450 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0fe06ad1-6af7-45a1-ba16-242227202423\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"526fc4ff353274034be35edf75f382257422cd48fd76d9656c2fc3dc6115910a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:19:46.863590 kubelet[1450]: E0515 10:19:46.863508 1450 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0fe06ad1-6af7-45a1-ba16-242227202423\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"526fc4ff353274034be35edf75f382257422cd48fd76d9656c2fc3dc6115910a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-t64sk" podUID="0fe06ad1-6af7-45a1-ba16-242227202423" May 15 10:19:47.424000 audit[2014]: NETFILTER_CFG table=filter:71 family=2 entries=10 op=nft_register_rule pid=2014 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:19:47.424000 audit[2014]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=ffffc6e803b0 a2=0 a3=1 items=0 ppid=1668 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:47.424000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:19:47.441000 audit[2014]: NETFILTER_CFG table=nat:72 family=2 entries=56 op=nft_register_chain pid=2014 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:19:47.441000 audit[2014]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19860 a0=3 a1=ffffc6e803b0 a2=0 a3=1 items=0 ppid=1668 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:47.441000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:19:47.609374 kubelet[1450]: E0515 10:19:47.609316 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:19:48.609616 kubelet[1450]: E0515 10:19:48.609548 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:19:48.938605 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1986043594.mount: Deactivated successfully. May 15 10:19:49.108320 env[1212]: time="2025-05-15T10:19:49.108266515Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:49.109774 env[1212]: time="2025-05-15T10:19:49.109746445Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cdcce3ec4624a24c28cdc07b0ee29ddf6703628edee7452a3f8a8b4816bfd057,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:49.111163 env[1212]: time="2025-05-15T10:19:49.111131527Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:49.112944 env[1212]: time="2025-05-15T10:19:49.112670852Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:19:49.113021 env[1212]: time="2025-05-15T10:19:49.112981179Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:cdcce3ec4624a24c28cdc07b0ee29ddf6703628edee7452a3f8a8b4816bfd057\"" May 15 10:19:49.123453 env[1212]: time="2025-05-15T10:19:49.123416113Z" level=info msg="CreateContainer within sandbox \"389ffa7fe80f06e188c15a4ae7b3c533a98302f393d377d965e26d6514fcac24\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 15 10:19:49.138184 env[1212]: time="2025-05-15T10:19:49.138142628Z" level=info msg="CreateContainer within sandbox \"389ffa7fe80f06e188c15a4ae7b3c533a98302f393d377d965e26d6514fcac24\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"c3e24861ca0a3368eeb893100fc72fa62d309afcb6a27ba9599b6e6abdcf66db\"" May 15 10:19:49.138644 env[1212]: time="2025-05-15T10:19:49.138599485Z" level=info msg="StartContainer for \"c3e24861ca0a3368eeb893100fc72fa62d309afcb6a27ba9599b6e6abdcf66db\"" May 15 10:19:49.153753 systemd[1]: Started cri-containerd-c3e24861ca0a3368eeb893100fc72fa62d309afcb6a27ba9599b6e6abdcf66db.scope. May 15 10:19:49.177000 audit[2028]: AVC avc: denied { perfmon } for pid=2028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:49.177000 audit[2028]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=1521 pid=2028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:49.177000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333653234383631636130613333363865656238393331303066633732 May 15 10:19:49.177000 audit[2028]: AVC avc: denied { bpf } for pid=2028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:49.177000 audit[2028]: AVC avc: denied { bpf } for pid=2028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:49.177000 audit[2028]: AVC avc: denied { bpf } for pid=2028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:49.177000 audit[2028]: AVC avc: denied { perfmon } for pid=2028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:49.177000 audit[2028]: AVC avc: denied { perfmon } for pid=2028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:49.177000 audit[2028]: AVC avc: denied { perfmon } for pid=2028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:49.177000 audit[2028]: AVC avc: denied { perfmon } for pid=2028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:49.177000 audit[2028]: AVC avc: denied { perfmon } for pid=2028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:49.177000 audit[2028]: AVC avc: denied { bpf } for pid=2028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:49.177000 audit[2028]: AVC avc: denied { bpf } for pid=2028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:49.177000 audit: BPF prog-id=78 op=LOAD May 15 10:19:49.177000 audit[2028]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=1521 pid=2028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:49.177000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333653234383631636130613333363865656238393331303066633732 May 15 10:19:49.177000 audit[2028]: AVC avc: denied { bpf } for pid=2028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:49.177000 audit[2028]: AVC avc: denied { bpf } for pid=2028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:49.177000 audit[2028]: AVC avc: denied { perfmon } for pid=2028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:49.177000 audit[2028]: AVC avc: denied { perfmon } for pid=2028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:49.177000 audit[2028]: AVC avc: denied { perfmon } for pid=2028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:49.177000 audit[2028]: AVC avc: denied { perfmon } for pid=2028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:49.177000 audit[2028]: AVC avc: denied { perfmon } for pid=2028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:49.177000 audit[2028]: AVC avc: denied { bpf } for pid=2028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:49.177000 audit[2028]: AVC avc: denied { bpf } for pid=2028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:49.177000 audit: BPF prog-id=79 op=LOAD May 15 10:19:49.177000 audit[2028]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=1521 pid=2028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:49.177000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333653234383631636130613333363865656238393331303066633732 May 15 10:19:49.177000 audit: BPF prog-id=79 op=UNLOAD May 15 10:19:49.177000 audit: BPF prog-id=78 op=UNLOAD May 15 10:19:49.177000 audit[2028]: AVC avc: denied { bpf } for pid=2028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:49.177000 audit[2028]: AVC avc: denied { bpf } for pid=2028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:49.177000 audit[2028]: AVC avc: denied { bpf } for pid=2028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:49.177000 audit[2028]: AVC avc: denied { perfmon } for pid=2028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:49.177000 audit[2028]: AVC avc: denied { perfmon } for pid=2028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:49.177000 audit[2028]: AVC avc: denied { perfmon } for pid=2028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:49.177000 audit[2028]: AVC avc: denied { perfmon } for pid=2028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:49.177000 audit[2028]: AVC avc: denied { perfmon } for pid=2028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:49.177000 audit[2028]: AVC avc: denied { bpf } for pid=2028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:49.177000 audit[2028]: AVC avc: denied { bpf } for pid=2028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:49.177000 audit: BPF prog-id=80 op=LOAD May 15 10:19:49.177000 audit[2028]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=1521 pid=2028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:49.177000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333653234383631636130613333363865656238393331303066633732 May 15 10:19:49.191100 env[1212]: time="2025-05-15T10:19:49.189728217Z" level=info msg="StartContainer for \"c3e24861ca0a3368eeb893100fc72fa62d309afcb6a27ba9599b6e6abdcf66db\" returns successfully" May 15 10:19:49.342249 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 15 10:19:49.342365 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 15 10:19:49.609886 kubelet[1450]: E0515 10:19:49.609781 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:19:49.846156 kubelet[1450]: E0515 10:19:49.846124 1450 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:49.861182 kubelet[1450]: I0515 10:19:49.860620 1450 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-d2gqc" podStartSLOduration=4.424768943 podStartE2EDuration="15.860604244s" podCreationTimestamp="2025-05-15 10:19:34 +0000 UTC" firstStartedPulling="2025-05-15 10:19:37.677818854 +0000 UTC m=+3.783321037" lastFinishedPulling="2025-05-15 10:19:49.113654115 +0000 UTC m=+15.219156338" observedRunningTime="2025-05-15 10:19:49.859850329 +0000 UTC m=+15.965352552" watchObservedRunningTime="2025-05-15 10:19:49.860604244 +0000 UTC m=+15.966106467" May 15 10:19:50.610716 kubelet[1450]: E0515 10:19:50.610670 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:19:50.648206 kernel: kauditd_printk_skb: 57 callbacks suppressed May 15 10:19:50.648323 kernel: audit: type=1400 audit(1747304390.644:546): avc: denied { write } for pid=2160 comm="tee" name="fd" dev="proc" ino=14612 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:19:50.644000 audit[2160]: AVC avc: denied { write } for pid=2160 comm="tee" name="fd" dev="proc" ino=14612 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:19:50.653000 kernel: audit: type=1300 audit(1747304390.644:546): arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd6b0fa2c a2=241 a3=1b6 items=1 ppid=2116 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.653099 kernel: audit: type=1307 audit(1747304390.644:546): cwd="/etc/service/enabled/cni/log" May 15 10:19:50.644000 audit[2160]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd6b0fa2c a2=241 a3=1b6 items=1 ppid=2116 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.644000 audit: CWD cwd="/etc/service/enabled/cni/log" May 15 10:19:50.644000 audit: PATH item=0 name="/dev/fd/63" inode=14609 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:19:50.655808 kernel: audit: type=1302 audit(1747304390.644:546): item=0 name="/dev/fd/63" inode=14609 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:19:50.644000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:19:50.659584 kernel: audit: type=1327 audit(1747304390.644:546): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:19:50.653000 audit[2167]: AVC avc: denied { write } for pid=2167 comm="tee" name="fd" dev="proc" ino=15677 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:19:50.662185 kernel: audit: type=1400 audit(1747304390.653:547): avc: denied { write } for pid=2167 comm="tee" name="fd" dev="proc" ino=15677 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:19:50.653000 audit[2167]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe9f2ca1a a2=241 a3=1b6 items=1 ppid=2130 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.666094 kernel: audit: type=1300 audit(1747304390.653:547): arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe9f2ca1a a2=241 a3=1b6 items=1 ppid=2130 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.653000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 15 10:19:50.667580 kernel: audit: type=1307 audit(1747304390.653:547): cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 15 10:19:50.653000 audit: PATH item=0 name="/dev/fd/63" inode=15671 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:19:50.670452 kernel: audit: type=1302 audit(1747304390.653:547): item=0 name="/dev/fd/63" inode=15671 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:19:50.653000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:19:50.673853 kernel: audit: type=1327 audit(1747304390.653:547): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:19:50.657000 audit[2176]: AVC avc: denied { write } for pid=2176 comm="tee" name="fd" dev="proc" ino=13801 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:19:50.657000 audit[2176]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc3751a2a a2=241 a3=1b6 items=1 ppid=2124 pid=2176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.657000 audit: CWD cwd="/etc/service/enabled/felix/log" May 15 10:19:50.657000 audit: PATH item=0 name="/dev/fd/63" inode=15674 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:19:50.657000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:19:50.659000 audit[2163]: AVC avc: denied { write } for pid=2163 comm="tee" name="fd" dev="proc" ino=14618 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:19:50.659000 audit[2163]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd02b7a2b a2=241 a3=1b6 items=1 ppid=2119 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.659000 audit: CWD cwd="/etc/service/enabled/bird/log" May 15 10:19:50.659000 audit: PATH item=0 name="/dev/fd/63" inode=13797 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:19:50.659000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:19:50.659000 audit[2191]: AVC avc: denied { write } for pid=2191 comm="tee" name="fd" dev="proc" ino=15681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:19:50.659000 audit[2191]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffeecc5a2a a2=241 a3=1b6 items=1 ppid=2118 pid=2191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.659000 audit: CWD cwd="/etc/service/enabled/confd/log" May 15 10:19:50.659000 audit: PATH item=0 name="/dev/fd/63" inode=13798 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:19:50.659000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:19:50.667000 audit[2195]: AVC avc: denied { write } for pid=2195 comm="tee" name="fd" dev="proc" ino=16584 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:19:50.667000 audit[2195]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe97aea1b a2=241 a3=1b6 items=1 ppid=2125 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.667000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 15 10:19:50.667000 audit: PATH item=0 name="/dev/fd/63" inode=16579 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:19:50.667000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:19:50.671000 audit[2185]: AVC avc: denied { write } for pid=2185 comm="tee" name="fd" dev="proc" ino=13805 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:19:50.671000 audit[2185]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe3a23a2a a2=241 a3=1b6 items=1 ppid=2117 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.671000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 15 10:19:50.671000 audit: PATH item=0 name="/dev/fd/63" inode=16576 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:19:50.671000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:19:50.752000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.752000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.752000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.752000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.752000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.752000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.752000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.752000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.752000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.752000 audit: BPF prog-id=81 op=LOAD May 15 10:19:50.752000 audit[2236]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff390b338 a2=98 a3=fffff390b328 items=0 ppid=2127 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.752000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:19:50.752000 audit: BPF prog-id=81 op=UNLOAD May 15 10:19:50.752000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.752000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.752000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.752000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.752000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.752000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.752000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.752000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.752000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.752000 audit: BPF prog-id=82 op=LOAD May 15 10:19:50.752000 audit[2236]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff390afc8 a2=74 a3=95 items=0 ppid=2127 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.752000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:19:50.752000 audit: BPF prog-id=82 op=UNLOAD May 15 10:19:50.752000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.752000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.752000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.752000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.752000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.752000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.752000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.752000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.752000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.752000 audit: BPF prog-id=83 op=LOAD May 15 10:19:50.752000 audit[2236]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff390b028 a2=94 a3=2 items=0 ppid=2127 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.752000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:19:50.752000 audit: BPF prog-id=83 op=UNLOAD May 15 10:19:50.838000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.838000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.838000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.838000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.838000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.838000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.838000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.838000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.838000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.838000 audit: BPF prog-id=84 op=LOAD May 15 10:19:50.838000 audit[2236]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff390afe8 a2=40 a3=fffff390b018 items=0 ppid=2127 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.838000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:19:50.838000 audit: BPF prog-id=84 op=UNLOAD May 15 10:19:50.838000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.838000 audit[2236]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=fffff390b100 a2=50 a3=0 items=0 ppid=2127 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.838000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:19:50.847839 kubelet[1450]: E0515 10:19:50.847794 1450 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:19:50.847000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.847000 audit[2236]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff390b058 a2=28 a3=fffff390b188 items=0 ppid=2127 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.847000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:19:50.847000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.847000 audit[2236]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff390b088 a2=28 a3=fffff390b1b8 items=0 ppid=2127 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.847000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:19:50.847000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.847000 audit[2236]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff390af38 a2=28 a3=fffff390b068 items=0 ppid=2127 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.847000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:19:50.847000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.847000 audit[2236]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff390b0a8 a2=28 a3=fffff390b1d8 items=0 ppid=2127 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.847000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:19:50.847000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.847000 audit[2236]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff390b088 a2=28 a3=fffff390b1b8 items=0 ppid=2127 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.847000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:19:50.847000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.847000 audit[2236]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff390b078 a2=28 a3=fffff390b1a8 items=0 ppid=2127 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.847000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:19:50.847000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.847000 audit[2236]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff390b0a8 a2=28 a3=fffff390b1d8 items=0 ppid=2127 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.847000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:19:50.847000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.847000 audit[2236]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff390b088 a2=28 a3=fffff390b1b8 items=0 ppid=2127 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.847000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:19:50.847000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.847000 audit[2236]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff390b0a8 a2=28 a3=fffff390b1d8 items=0 ppid=2127 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.847000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:19:50.847000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.847000 audit[2236]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff390b078 a2=28 a3=fffff390b1a8 items=0 ppid=2127 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.847000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:19:50.847000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.847000 audit[2236]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff390b0f8 a2=28 a3=fffff390b238 items=0 ppid=2127 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.847000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:19:50.847000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.847000 audit[2236]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffff390ae30 a2=50 a3=0 items=0 ppid=2127 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.847000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:19:50.847000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.847000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.847000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.847000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.847000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.847000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.847000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.847000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.847000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.847000 audit: BPF prog-id=85 op=LOAD May 15 10:19:50.847000 audit[2236]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffff390ae38 a2=94 a3=5 items=0 ppid=2127 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.847000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:19:50.847000 audit: BPF prog-id=85 op=UNLOAD May 15 10:19:50.847000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.847000 audit[2236]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffff390af40 a2=50 a3=0 items=0 ppid=2127 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.847000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:19:50.847000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.847000 audit[2236]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=fffff390b088 a2=4 a3=3 items=0 ppid=2127 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.847000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:19:50.847000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.847000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.847000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.847000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.847000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.847000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.847000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.847000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.847000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.847000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.847000 audit[2236]: AVC avc: denied { confidentiality } for pid=2236 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:19:50.847000 audit[2236]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff390b068 a2=94 a3=6 items=0 ppid=2127 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.847000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:19:50.848000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.848000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.848000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.848000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.848000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.848000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.848000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.848000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.848000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.848000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.848000 audit[2236]: AVC avc: denied { confidentiality } for pid=2236 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:19:50.848000 audit[2236]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff390a838 a2=94 a3=83 items=0 ppid=2127 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.848000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:19:50.848000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.848000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.848000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.848000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.848000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.848000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.848000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.848000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.848000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.848000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.848000 audit[2236]: AVC avc: denied { confidentiality } for pid=2236 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:19:50.848000 audit[2236]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff390a838 a2=94 a3=83 items=0 ppid=2127 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.848000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:19:50.862000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.862000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.862000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.862000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.862000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.862000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.862000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.862000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.862000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.862000 audit: BPF prog-id=86 op=LOAD May 15 10:19:50.862000 audit[2249]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe7fb6c88 a2=98 a3=ffffe7fb6c78 items=0 ppid=2127 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.862000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 10:19:50.863000 audit: BPF prog-id=86 op=UNLOAD May 15 10:19:50.863000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.863000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.863000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.863000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.863000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.863000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.863000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.863000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.863000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.863000 audit: BPF prog-id=87 op=LOAD May 15 10:19:50.863000 audit[2249]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe7fb6b38 a2=74 a3=95 items=0 ppid=2127 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.863000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 10:19:50.863000 audit: BPF prog-id=87 op=UNLOAD May 15 10:19:50.863000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.863000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.863000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.863000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.863000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.863000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.863000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.863000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.863000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.863000 audit: BPF prog-id=88 op=LOAD May 15 10:19:50.863000 audit[2249]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe7fb6b68 a2=40 a3=ffffe7fb6b98 items=0 ppid=2127 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.863000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 10:19:50.863000 audit: BPF prog-id=88 op=UNLOAD May 15 10:19:50.917984 systemd-networkd[1041]: vxlan.calico: Link UP May 15 10:19:50.917992 systemd-networkd[1041]: vxlan.calico: Gained carrier May 15 10:19:50.937000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.937000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.937000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.937000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.937000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.937000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.937000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.937000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.937000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.937000 audit: BPF prog-id=89 op=LOAD May 15 10:19:50.937000 audit[2295]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcea1b8e8 a2=98 a3=ffffcea1b8d8 items=0 ppid=2127 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.937000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:19:50.937000 audit: BPF prog-id=89 op=UNLOAD May 15 10:19:50.937000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.937000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.937000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.937000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.937000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.937000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.937000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.937000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.937000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.937000 audit: BPF prog-id=90 op=LOAD May 15 10:19:50.937000 audit[2295]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcea1b5c8 a2=74 a3=95 items=0 ppid=2127 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.937000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:19:50.937000 audit: BPF prog-id=90 op=UNLOAD May 15 10:19:50.937000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.937000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.937000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.937000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.937000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.937000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.937000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.937000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.937000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.937000 audit: BPF prog-id=91 op=LOAD May 15 10:19:50.937000 audit[2295]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcea1b628 a2=94 a3=2 items=0 ppid=2127 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.937000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:19:50.937000 audit: BPF prog-id=91 op=UNLOAD May 15 10:19:50.937000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.937000 audit[2295]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffcea1b658 a2=28 a3=ffffcea1b788 items=0 ppid=2127 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.937000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:19:50.937000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.937000 audit[2295]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcea1b688 a2=28 a3=ffffcea1b7b8 items=0 ppid=2127 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.937000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:19:50.937000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.937000 audit[2295]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcea1b538 a2=28 a3=ffffcea1b668 items=0 ppid=2127 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.937000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:19:50.937000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.937000 audit[2295]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffcea1b6a8 a2=28 a3=ffffcea1b7d8 items=0 ppid=2127 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.937000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:19:50.937000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.937000 audit[2295]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffcea1b688 a2=28 a3=ffffcea1b7b8 items=0 ppid=2127 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.937000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:19:50.937000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.937000 audit[2295]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffcea1b678 a2=28 a3=ffffcea1b7a8 items=0 ppid=2127 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.937000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:19:50.937000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.937000 audit[2295]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffcea1b6a8 a2=28 a3=ffffcea1b7d8 items=0 ppid=2127 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.937000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:19:50.937000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.937000 audit[2295]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcea1b688 a2=28 a3=ffffcea1b7b8 items=0 ppid=2127 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.937000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:19:50.937000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.937000 audit[2295]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcea1b6a8 a2=28 a3=ffffcea1b7d8 items=0 ppid=2127 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.937000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:19:50.937000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.937000 audit[2295]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcea1b678 a2=28 a3=ffffcea1b7a8 items=0 ppid=2127 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.937000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:19:50.937000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.937000 audit[2295]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffcea1b6f8 a2=28 a3=ffffcea1b838 items=0 ppid=2127 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.937000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:19:50.937000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.937000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.937000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.937000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.937000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.937000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.937000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.937000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.937000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.937000 audit: BPF prog-id=92 op=LOAD May 15 10:19:50.937000 audit[2295]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffcea1b518 a2=40 a3=ffffcea1b548 items=0 ppid=2127 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.937000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:19:50.937000 audit: BPF prog-id=92 op=UNLOAD May 15 10:19:50.938000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.938000 audit[2295]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffcea1b540 a2=50 a3=0 items=0 ppid=2127 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.938000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:19:50.938000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.938000 audit[2295]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=ffffcea1b540 a2=50 a3=0 items=0 ppid=2127 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.938000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:19:50.938000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.938000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.938000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.938000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.938000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.938000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.938000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.938000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.938000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.938000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.938000 audit: BPF prog-id=93 op=LOAD May 15 10:19:50.938000 audit[2295]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffcea1aca8 a2=94 a3=2 items=0 ppid=2127 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.938000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:19:50.938000 audit: BPF prog-id=93 op=UNLOAD May 15 10:19:50.938000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.938000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.938000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.938000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.938000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.938000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.938000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.938000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.938000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.938000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.938000 audit: BPF prog-id=94 op=LOAD May 15 10:19:50.938000 audit[2295]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffcea1ae38 a2=94 a3=30 items=0 ppid=2127 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.938000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:19:50.941000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.941000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.941000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.941000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.941000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.941000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.941000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.941000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.941000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.941000 audit: BPF prog-id=95 op=LOAD May 15 10:19:50.941000 audit[2297]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd3a7d898 a2=98 a3=ffffd3a7d888 items=0 ppid=2127 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.941000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:19:50.941000 audit: BPF prog-id=95 op=UNLOAD May 15 10:19:50.941000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.941000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.941000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.941000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.941000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.941000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.941000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.941000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.941000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.941000 audit: BPF prog-id=96 op=LOAD May 15 10:19:50.941000 audit[2297]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd3a7d528 a2=74 a3=95 items=0 ppid=2127 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.941000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:19:50.941000 audit: BPF prog-id=96 op=UNLOAD May 15 10:19:50.941000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.941000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.941000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.941000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.941000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.941000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.941000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.941000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.941000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:50.941000 audit: BPF prog-id=97 op=LOAD May 15 10:19:50.941000 audit[2297]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd3a7d588 a2=94 a3=2 items=0 ppid=2127 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:50.941000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:19:50.942000 audit: BPF prog-id=97 op=UNLOAD May 15 10:19:51.025000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.025000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.025000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.025000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.025000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.025000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.025000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.025000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.025000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.025000 audit: BPF prog-id=98 op=LOAD May 15 10:19:51.025000 audit[2297]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd3a7d548 a2=40 a3=ffffd3a7d578 items=0 ppid=2127 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:51.025000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:19:51.025000 audit: BPF prog-id=98 op=UNLOAD May 15 10:19:51.025000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.025000 audit[2297]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffd3a7d660 a2=50 a3=0 items=0 ppid=2127 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:51.025000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:19:51.033000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.033000 audit[2297]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd3a7d5b8 a2=28 a3=ffffd3a7d6e8 items=0 ppid=2127 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:51.033000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:19:51.033000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.033000 audit[2297]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd3a7d5e8 a2=28 a3=ffffd3a7d718 items=0 ppid=2127 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:51.033000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:19:51.033000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.033000 audit[2297]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd3a7d498 a2=28 a3=ffffd3a7d5c8 items=0 ppid=2127 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:51.033000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:19:51.033000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.033000 audit[2297]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd3a7d608 a2=28 a3=ffffd3a7d738 items=0 ppid=2127 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:51.033000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:19:51.033000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.033000 audit[2297]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd3a7d5e8 a2=28 a3=ffffd3a7d718 items=0 ppid=2127 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:51.033000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:19:51.033000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.033000 audit[2297]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd3a7d5d8 a2=28 a3=ffffd3a7d708 items=0 ppid=2127 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:51.033000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:19:51.033000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.033000 audit[2297]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd3a7d608 a2=28 a3=ffffd3a7d738 items=0 ppid=2127 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:51.033000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:19:51.033000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.033000 audit[2297]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd3a7d5e8 a2=28 a3=ffffd3a7d718 items=0 ppid=2127 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:51.033000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:19:51.033000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.033000 audit[2297]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd3a7d608 a2=28 a3=ffffd3a7d738 items=0 ppid=2127 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:51.033000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:19:51.033000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.033000 audit[2297]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd3a7d5d8 a2=28 a3=ffffd3a7d708 items=0 ppid=2127 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:51.033000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:19:51.033000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.033000 audit[2297]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd3a7d658 a2=28 a3=ffffd3a7d798 items=0 ppid=2127 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:51.033000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:19:51.034000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.034000 audit[2297]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffd3a7d390 a2=50 a3=0 items=0 ppid=2127 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:51.034000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:19:51.034000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.034000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.034000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.034000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.034000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.034000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.034000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.034000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.034000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.034000 audit: BPF prog-id=99 op=LOAD May 15 10:19:51.034000 audit[2297]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffd3a7d398 a2=94 a3=5 items=0 ppid=2127 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:51.034000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:19:51.034000 audit: BPF prog-id=99 op=UNLOAD May 15 10:19:51.034000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.034000 audit[2297]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffd3a7d4a0 a2=50 a3=0 items=0 ppid=2127 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:51.034000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:19:51.034000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.034000 audit[2297]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffd3a7d5e8 a2=4 a3=3 items=0 ppid=2127 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:51.034000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:19:51.034000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.034000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.034000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.034000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.034000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.034000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.034000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.034000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.034000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.034000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.034000 audit[2297]: AVC avc: denied { confidentiality } for pid=2297 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:19:51.034000 audit[2297]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd3a7d5c8 a2=94 a3=6 items=0 ppid=2127 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:51.034000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:19:51.034000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.034000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.034000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.034000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.034000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.034000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.034000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.034000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.034000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.034000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.034000 audit[2297]: AVC avc: denied { confidentiality } for pid=2297 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:19:51.034000 audit[2297]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd3a7cd98 a2=94 a3=83 items=0 ppid=2127 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:51.034000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:19:51.034000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.034000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.034000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.034000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.034000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.034000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.034000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.034000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.034000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.034000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.034000 audit[2297]: AVC avc: denied { confidentiality } for pid=2297 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:19:51.034000 audit[2297]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd3a7cd98 a2=94 a3=83 items=0 ppid=2127 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:51.034000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:19:51.034000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.034000 audit[2297]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd3a7e7d8 a2=10 a3=ffffd3a7e8c8 items=0 ppid=2127 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:51.034000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:19:51.035000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.035000 audit[2297]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd3a7e698 a2=10 a3=ffffd3a7e788 items=0 ppid=2127 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:51.035000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:19:51.035000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.035000 audit[2297]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd3a7e608 a2=10 a3=ffffd3a7e788 items=0 ppid=2127 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:51.035000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:19:51.035000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:19:51.035000 audit[2297]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd3a7e608 a2=10 a3=ffffd3a7e788 items=0 ppid=2127 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:51.035000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:19:51.043000 audit: BPF prog-id=94 op=UNLOAD May 15 10:19:51.091000 audit[2324]: NETFILTER_CFG table=mangle:73 family=2 entries=16 op=nft_register_chain pid=2324 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:19:51.091000 audit[2324]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffcaa46920 a2=0 a3=ffff839d0fa8 items=0 ppid=2127 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:51.091000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:19:51.103000 audit[2326]: NETFILTER_CFG table=filter:74 family=2 entries=39 op=nft_register_chain pid=2326 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:19:51.103000 audit[2326]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=fffff70535a0 a2=0 a3=ffffb001dfa8 items=0 ppid=2127 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:51.103000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:19:51.104000 audit[2329]: NETFILTER_CFG table=nat:75 family=2 entries=15 op=nft_register_chain pid=2329 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:19:51.104000 audit[2329]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffdf110460 a2=0 a3=ffff868e4fa8 items=0 ppid=2127 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:51.104000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:19:51.106000 audit[2325]: NETFILTER_CFG table=raw:76 family=2 entries=21 op=nft_register_chain pid=2325 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:19:51.106000 audit[2325]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=ffffeccb4d10 a2=0 a3=ffff9ec62fa8 items=0 ppid=2127 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:51.106000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:19:51.611110 kubelet[1450]: E0515 10:19:51.611061 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:19:52.211405 systemd-networkd[1041]: vxlan.calico: Gained IPv6LL May 15 10:19:52.612097 kubelet[1450]: E0515 10:19:52.611982 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:19:53.613172 kubelet[1450]: E0515 10:19:53.613114 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:19:54.601577 kubelet[1450]: E0515 10:19:54.601539 1450 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:19:54.614047 kubelet[1450]: E0515 10:19:54.614009 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:19:55.614753 kubelet[1450]: E0515 10:19:55.614708 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:19:56.615141 kubelet[1450]: E0515 10:19:56.615104 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:19:57.616343 kubelet[1450]: E0515 10:19:57.616267 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:19:57.897000 audit[2347]: NETFILTER_CFG table=filter:77 family=2 entries=9 op=nft_register_rule pid=2347 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:19:57.899471 kernel: kauditd_printk_skb: 505 callbacks suppressed May 15 10:19:57.899569 kernel: audit: type=1325 audit(1747304397.897:648): table=filter:77 family=2 entries=9 op=nft_register_rule pid=2347 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:19:57.897000 audit[2347]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffcbe03d80 a2=0 a3=1 items=0 ppid=1668 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:57.904923 kernel: audit: type=1300 audit(1747304397.897:648): arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffcbe03d80 a2=0 a3=1 items=0 ppid=1668 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:57.904987 kernel: audit: type=1327 audit(1747304397.897:648): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:19:57.897000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:19:57.908279 kernel: audit: type=1325 audit(1747304397.907:649): table=nat:78 family=2 entries=27 op=nft_register_chain pid=2347 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:19:57.907000 audit[2347]: NETFILTER_CFG table=nat:78 family=2 entries=27 op=nft_register_chain pid=2347 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:19:57.907000 audit[2347]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=ffffcbe03d80 a2=0 a3=1 items=0 ppid=1668 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:57.913847 kernel: audit: type=1300 audit(1747304397.907:649): arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=ffffcbe03d80 a2=0 a3=1 items=0 ppid=1668 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:19:57.913909 kernel: audit: type=1327 audit(1747304397.907:649): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:19:57.907000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:19:58.617307 kubelet[1450]: E0515 10:19:58.617269 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:19:59.618480 kubelet[1450]: E0515 10:19:59.618440 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:19:59.804756 env[1212]: time="2025-05-15T10:19:59.804699273Z" level=info msg="StopPodSandbox for \"b09cb1ed9f4a03cb49bddff331d6929ff4b7bf633a8a441aaba4cfa99cb5410b\"" May 15 10:19:59.914943 env[1212]: 2025-05-15 10:19:59.847 [INFO][2366] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b09cb1ed9f4a03cb49bddff331d6929ff4b7bf633a8a441aaba4cfa99cb5410b" May 15 10:19:59.914943 env[1212]: 2025-05-15 10:19:59.848 [INFO][2366] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="b09cb1ed9f4a03cb49bddff331d6929ff4b7bf633a8a441aaba4cfa99cb5410b" iface="eth0" netns="/var/run/netns/cni-e96d24ed-f415-123a-85b5-00196b6dbc90" May 15 10:19:59.914943 env[1212]: 2025-05-15 10:19:59.848 [INFO][2366] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="b09cb1ed9f4a03cb49bddff331d6929ff4b7bf633a8a441aaba4cfa99cb5410b" iface="eth0" netns="/var/run/netns/cni-e96d24ed-f415-123a-85b5-00196b6dbc90" May 15 10:19:59.914943 env[1212]: 2025-05-15 10:19:59.848 [INFO][2366] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="b09cb1ed9f4a03cb49bddff331d6929ff4b7bf633a8a441aaba4cfa99cb5410b" iface="eth0" netns="/var/run/netns/cni-e96d24ed-f415-123a-85b5-00196b6dbc90" May 15 10:19:59.914943 env[1212]: 2025-05-15 10:19:59.848 [INFO][2366] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b09cb1ed9f4a03cb49bddff331d6929ff4b7bf633a8a441aaba4cfa99cb5410b" May 15 10:19:59.914943 env[1212]: 2025-05-15 10:19:59.848 [INFO][2366] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b09cb1ed9f4a03cb49bddff331d6929ff4b7bf633a8a441aaba4cfa99cb5410b" May 15 10:19:59.914943 env[1212]: 2025-05-15 10:19:59.900 [INFO][2374] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b09cb1ed9f4a03cb49bddff331d6929ff4b7bf633a8a441aaba4cfa99cb5410b" HandleID="k8s-pod-network.b09cb1ed9f4a03cb49bddff331d6929ff4b7bf633a8a441aaba4cfa99cb5410b" Workload="10.0.0.90-k8s-csi--node--driver--qvt4t-eth0" May 15 10:19:59.914943 env[1212]: 2025-05-15 10:19:59.900 [INFO][2374] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:19:59.914943 env[1212]: 2025-05-15 10:19:59.900 [INFO][2374] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:19:59.914943 env[1212]: 2025-05-15 10:19:59.910 [WARNING][2374] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b09cb1ed9f4a03cb49bddff331d6929ff4b7bf633a8a441aaba4cfa99cb5410b" HandleID="k8s-pod-network.b09cb1ed9f4a03cb49bddff331d6929ff4b7bf633a8a441aaba4cfa99cb5410b" Workload="10.0.0.90-k8s-csi--node--driver--qvt4t-eth0" May 15 10:19:59.914943 env[1212]: 2025-05-15 10:19:59.910 [INFO][2374] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b09cb1ed9f4a03cb49bddff331d6929ff4b7bf633a8a441aaba4cfa99cb5410b" HandleID="k8s-pod-network.b09cb1ed9f4a03cb49bddff331d6929ff4b7bf633a8a441aaba4cfa99cb5410b" Workload="10.0.0.90-k8s-csi--node--driver--qvt4t-eth0" May 15 10:19:59.914943 env[1212]: 2025-05-15 10:19:59.911 [INFO][2374] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:19:59.914943 env[1212]: 2025-05-15 10:19:59.913 [INFO][2366] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b09cb1ed9f4a03cb49bddff331d6929ff4b7bf633a8a441aaba4cfa99cb5410b" May 15 10:19:59.916529 env[1212]: time="2025-05-15T10:19:59.916481638Z" level=info msg="TearDown network for sandbox \"b09cb1ed9f4a03cb49bddff331d6929ff4b7bf633a8a441aaba4cfa99cb5410b\" successfully" May 15 10:19:59.916529 env[1212]: time="2025-05-15T10:19:59.916525181Z" level=info msg="StopPodSandbox for \"b09cb1ed9f4a03cb49bddff331d6929ff4b7bf633a8a441aaba4cfa99cb5410b\" returns successfully" May 15 10:19:59.917264 env[1212]: time="2025-05-15T10:19:59.917227904Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qvt4t,Uid:31c432de-1a0c-4836-b61b-14048a8034b7,Namespace:calico-system,Attempt:1,}" May 15 10:19:59.917722 systemd[1]: run-netns-cni\x2de96d24ed\x2df415\x2d123a\x2d85b5\x2d00196b6dbc90.mount: Deactivated successfully. May 15 10:20:00.026221 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 10:20:00.026332 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0be95f00492: link becomes ready May 15 10:20:00.026326 systemd-networkd[1041]: cali0be95f00492: Link UP May 15 10:20:00.026535 systemd-networkd[1041]: cali0be95f00492: Gained carrier May 15 10:20:00.036827 env[1212]: 2025-05-15 10:19:59.960 [INFO][2383] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.90-k8s-csi--node--driver--qvt4t-eth0 csi-node-driver- calico-system 31c432de-1a0c-4836-b61b-14048a8034b7 1089 0 2025-05-15 10:19:34 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:5b5cc68cd5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.0.0.90 csi-node-driver-qvt4t eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali0be95f00492 [] []}} ContainerID="459215fbe2a1169ed393b3f5cf1975fac9a2781930c3e96c758f62124d78bf44" Namespace="calico-system" Pod="csi-node-driver-qvt4t" WorkloadEndpoint="10.0.0.90-k8s-csi--node--driver--qvt4t-" May 15 10:20:00.036827 env[1212]: 2025-05-15 10:19:59.960 [INFO][2383] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="459215fbe2a1169ed393b3f5cf1975fac9a2781930c3e96c758f62124d78bf44" Namespace="calico-system" Pod="csi-node-driver-qvt4t" WorkloadEndpoint="10.0.0.90-k8s-csi--node--driver--qvt4t-eth0" May 15 10:20:00.036827 env[1212]: 2025-05-15 10:19:59.985 [INFO][2399] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="459215fbe2a1169ed393b3f5cf1975fac9a2781930c3e96c758f62124d78bf44" HandleID="k8s-pod-network.459215fbe2a1169ed393b3f5cf1975fac9a2781930c3e96c758f62124d78bf44" Workload="10.0.0.90-k8s-csi--node--driver--qvt4t-eth0" May 15 10:20:00.036827 env[1212]: 2025-05-15 10:19:59.996 [INFO][2399] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="459215fbe2a1169ed393b3f5cf1975fac9a2781930c3e96c758f62124d78bf44" HandleID="k8s-pod-network.459215fbe2a1169ed393b3f5cf1975fac9a2781930c3e96c758f62124d78bf44" Workload="10.0.0.90-k8s-csi--node--driver--qvt4t-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40005ac4d0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.90", "pod":"csi-node-driver-qvt4t", "timestamp":"2025-05-15 10:19:59.985185502 +0000 UTC"}, Hostname:"10.0.0.90", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:20:00.036827 env[1212]: 2025-05-15 10:19:59.996 [INFO][2399] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:20:00.036827 env[1212]: 2025-05-15 10:19:59.996 [INFO][2399] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:20:00.036827 env[1212]: 2025-05-15 10:19:59.996 [INFO][2399] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.90' May 15 10:20:00.036827 env[1212]: 2025-05-15 10:19:59.998 [INFO][2399] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.459215fbe2a1169ed393b3f5cf1975fac9a2781930c3e96c758f62124d78bf44" host="10.0.0.90" May 15 10:20:00.036827 env[1212]: 2025-05-15 10:20:00.002 [INFO][2399] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.90" May 15 10:20:00.036827 env[1212]: 2025-05-15 10:20:00.007 [INFO][2399] ipam/ipam.go 489: Trying affinity for 192.168.37.64/26 host="10.0.0.90" May 15 10:20:00.036827 env[1212]: 2025-05-15 10:20:00.008 [INFO][2399] ipam/ipam.go 155: Attempting to load block cidr=192.168.37.64/26 host="10.0.0.90" May 15 10:20:00.036827 env[1212]: 2025-05-15 10:20:00.010 [INFO][2399] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.37.64/26 host="10.0.0.90" May 15 10:20:00.036827 env[1212]: 2025-05-15 10:20:00.010 [INFO][2399] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.37.64/26 handle="k8s-pod-network.459215fbe2a1169ed393b3f5cf1975fac9a2781930c3e96c758f62124d78bf44" host="10.0.0.90" May 15 10:20:00.036827 env[1212]: 2025-05-15 10:20:00.012 [INFO][2399] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.459215fbe2a1169ed393b3f5cf1975fac9a2781930c3e96c758f62124d78bf44 May 15 10:20:00.036827 env[1212]: 2025-05-15 10:20:00.016 [INFO][2399] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.37.64/26 handle="k8s-pod-network.459215fbe2a1169ed393b3f5cf1975fac9a2781930c3e96c758f62124d78bf44" host="10.0.0.90" May 15 10:20:00.036827 env[1212]: 2025-05-15 10:20:00.020 [INFO][2399] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.37.65/26] block=192.168.37.64/26 handle="k8s-pod-network.459215fbe2a1169ed393b3f5cf1975fac9a2781930c3e96c758f62124d78bf44" host="10.0.0.90" May 15 10:20:00.036827 env[1212]: 2025-05-15 10:20:00.020 [INFO][2399] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.37.65/26] handle="k8s-pod-network.459215fbe2a1169ed393b3f5cf1975fac9a2781930c3e96c758f62124d78bf44" host="10.0.0.90" May 15 10:20:00.036827 env[1212]: 2025-05-15 10:20:00.020 [INFO][2399] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:20:00.036827 env[1212]: 2025-05-15 10:20:00.020 [INFO][2399] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.37.65/26] IPv6=[] ContainerID="459215fbe2a1169ed393b3f5cf1975fac9a2781930c3e96c758f62124d78bf44" HandleID="k8s-pod-network.459215fbe2a1169ed393b3f5cf1975fac9a2781930c3e96c758f62124d78bf44" Workload="10.0.0.90-k8s-csi--node--driver--qvt4t-eth0" May 15 10:20:00.037409 env[1212]: 2025-05-15 10:20:00.022 [INFO][2383] cni-plugin/k8s.go 386: Populated endpoint ContainerID="459215fbe2a1169ed393b3f5cf1975fac9a2781930c3e96c758f62124d78bf44" Namespace="calico-system" Pod="csi-node-driver-qvt4t" WorkloadEndpoint="10.0.0.90-k8s-csi--node--driver--qvt4t-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.90-k8s-csi--node--driver--qvt4t-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"31c432de-1a0c-4836-b61b-14048a8034b7", ResourceVersion:"1089", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 19, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.90", ContainerID:"", Pod:"csi-node-driver-qvt4t", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.37.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali0be95f00492", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:20:00.037409 env[1212]: 2025-05-15 10:20:00.022 [INFO][2383] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.37.65/32] ContainerID="459215fbe2a1169ed393b3f5cf1975fac9a2781930c3e96c758f62124d78bf44" Namespace="calico-system" Pod="csi-node-driver-qvt4t" WorkloadEndpoint="10.0.0.90-k8s-csi--node--driver--qvt4t-eth0" May 15 10:20:00.037409 env[1212]: 2025-05-15 10:20:00.022 [INFO][2383] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali0be95f00492 ContainerID="459215fbe2a1169ed393b3f5cf1975fac9a2781930c3e96c758f62124d78bf44" Namespace="calico-system" Pod="csi-node-driver-qvt4t" WorkloadEndpoint="10.0.0.90-k8s-csi--node--driver--qvt4t-eth0" May 15 10:20:00.037409 env[1212]: 2025-05-15 10:20:00.026 [INFO][2383] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="459215fbe2a1169ed393b3f5cf1975fac9a2781930c3e96c758f62124d78bf44" Namespace="calico-system" Pod="csi-node-driver-qvt4t" WorkloadEndpoint="10.0.0.90-k8s-csi--node--driver--qvt4t-eth0" May 15 10:20:00.037409 env[1212]: 2025-05-15 10:20:00.026 [INFO][2383] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="459215fbe2a1169ed393b3f5cf1975fac9a2781930c3e96c758f62124d78bf44" Namespace="calico-system" Pod="csi-node-driver-qvt4t" WorkloadEndpoint="10.0.0.90-k8s-csi--node--driver--qvt4t-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.90-k8s-csi--node--driver--qvt4t-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"31c432de-1a0c-4836-b61b-14048a8034b7", ResourceVersion:"1089", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 19, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.90", ContainerID:"459215fbe2a1169ed393b3f5cf1975fac9a2781930c3e96c758f62124d78bf44", Pod:"csi-node-driver-qvt4t", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.37.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali0be95f00492", MAC:"c6:cc:f7:73:84:66", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:20:00.037409 env[1212]: 2025-05-15 10:20:00.035 [INFO][2383] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="459215fbe2a1169ed393b3f5cf1975fac9a2781930c3e96c758f62124d78bf44" Namespace="calico-system" Pod="csi-node-driver-qvt4t" WorkloadEndpoint="10.0.0.90-k8s-csi--node--driver--qvt4t-eth0" May 15 10:20:00.046000 audit[2426]: NETFILTER_CFG table=filter:79 family=2 entries=34 op=nft_register_chain pid=2426 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:20:00.046000 audit[2426]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19148 a0=3 a1=ffffc40e3bd0 a2=0 a3=ffffbd7effa8 items=0 ppid=2127 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:00.050842 env[1212]: time="2025-05-15T10:20:00.050731326Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:20:00.050842 env[1212]: time="2025-05-15T10:20:00.050801540Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:20:00.050842 env[1212]: time="2025-05-15T10:20:00.050812616Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:20:00.051054 env[1212]: time="2025-05-15T10:20:00.051008824Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/459215fbe2a1169ed393b3f5cf1975fac9a2781930c3e96c758f62124d78bf44 pid=2431 runtime=io.containerd.runc.v2 May 15 10:20:00.052414 kernel: audit: type=1325 audit(1747304400.046:650): table=filter:79 family=2 entries=34 op=nft_register_chain pid=2426 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:20:00.052475 kernel: audit: type=1300 audit(1747304400.046:650): arch=c00000b7 syscall=211 success=yes exit=19148 a0=3 a1=ffffc40e3bd0 a2=0 a3=ffffbd7effa8 items=0 ppid=2127 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:00.046000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:20:00.056768 kernel: audit: type=1327 audit(1747304400.046:650): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:20:00.066822 systemd[1]: Started cri-containerd-459215fbe2a1169ed393b3f5cf1975fac9a2781930c3e96c758f62124d78bf44.scope. May 15 10:20:00.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:00.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:00.092242 kernel: audit: type=1400 audit(1747304400.089:651): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:00.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:00.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:00.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:00.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:00.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:00.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:00.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:00.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:00.091000 audit: BPF prog-id=100 op=LOAD May 15 10:20:00.092000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:00.092000 audit[2441]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2431 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:00.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435393231356662653261313136396564333933623366356366313937 May 15 10:20:00.092000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:00.092000 audit[2441]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2431 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:00.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435393231356662653261313136396564333933623366356366313937 May 15 10:20:00.092000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:00.092000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:00.092000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:00.092000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:00.092000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:00.092000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:00.092000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:00.092000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:00.092000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:00.092000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:00.092000 audit: BPF prog-id=101 op=LOAD May 15 10:20:00.092000 audit[2441]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2431 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:00.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435393231356662653261313136396564333933623366356366313937 May 15 10:20:00.092000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:00.092000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:00.092000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:00.092000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:00.092000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:00.092000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:00.092000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:00.092000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:00.092000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:00.092000 audit: BPF prog-id=102 op=LOAD May 15 10:20:00.092000 audit[2441]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2431 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:00.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435393231356662653261313136396564333933623366356366313937 May 15 10:20:00.092000 audit: BPF prog-id=102 op=UNLOAD May 15 10:20:00.092000 audit: BPF prog-id=101 op=UNLOAD May 15 10:20:00.092000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:00.092000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:00.092000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:00.092000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:00.092000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:00.092000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:00.092000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:00.092000 audit[2441]: AVC avc: denied { perfmon } for pid=2441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:00.092000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:00.092000 audit[2441]: AVC avc: denied { bpf } for pid=2441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:00.092000 audit: BPF prog-id=103 op=LOAD May 15 10:20:00.092000 audit[2441]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2431 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:00.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435393231356662653261313136396564333933623366356366313937 May 15 10:20:00.093387 systemd-resolved[1155]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:20:00.102612 env[1212]: time="2025-05-15T10:20:00.102565138Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qvt4t,Uid:31c432de-1a0c-4836-b61b-14048a8034b7,Namespace:calico-system,Attempt:1,} returns sandbox id \"459215fbe2a1169ed393b3f5cf1975fac9a2781930c3e96c758f62124d78bf44\"" May 15 10:20:00.104621 env[1212]: time="2025-05-15T10:20:00.104592071Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 15 10:20:00.619361 kubelet[1450]: E0515 10:20:00.619314 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:20:00.807079 env[1212]: time="2025-05-15T10:20:00.807035088Z" level=info msg="StopPodSandbox for \"526fc4ff353274034be35edf75f382257422cd48fd76d9656c2fc3dc6115910a\"" May 15 10:20:00.897514 env[1212]: 2025-05-15 10:20:00.862 [INFO][2479] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="526fc4ff353274034be35edf75f382257422cd48fd76d9656c2fc3dc6115910a" May 15 10:20:00.897514 env[1212]: 2025-05-15 10:20:00.863 [INFO][2479] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="526fc4ff353274034be35edf75f382257422cd48fd76d9656c2fc3dc6115910a" iface="eth0" netns="/var/run/netns/cni-b8510723-1aec-2415-64f5-d3e3184c7d2a" May 15 10:20:00.897514 env[1212]: 2025-05-15 10:20:00.863 [INFO][2479] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="526fc4ff353274034be35edf75f382257422cd48fd76d9656c2fc3dc6115910a" iface="eth0" netns="/var/run/netns/cni-b8510723-1aec-2415-64f5-d3e3184c7d2a" May 15 10:20:00.897514 env[1212]: 2025-05-15 10:20:00.864 [INFO][2479] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="526fc4ff353274034be35edf75f382257422cd48fd76d9656c2fc3dc6115910a" iface="eth0" netns="/var/run/netns/cni-b8510723-1aec-2415-64f5-d3e3184c7d2a" May 15 10:20:00.897514 env[1212]: 2025-05-15 10:20:00.864 [INFO][2479] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="526fc4ff353274034be35edf75f382257422cd48fd76d9656c2fc3dc6115910a" May 15 10:20:00.897514 env[1212]: 2025-05-15 10:20:00.864 [INFO][2479] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="526fc4ff353274034be35edf75f382257422cd48fd76d9656c2fc3dc6115910a" May 15 10:20:00.897514 env[1212]: 2025-05-15 10:20:00.883 [INFO][2488] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="526fc4ff353274034be35edf75f382257422cd48fd76d9656c2fc3dc6115910a" HandleID="k8s-pod-network.526fc4ff353274034be35edf75f382257422cd48fd76d9656c2fc3dc6115910a" Workload="10.0.0.90-k8s-nginx--deployment--7fcdb87857--t64sk-eth0" May 15 10:20:00.897514 env[1212]: 2025-05-15 10:20:00.883 [INFO][2488] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:20:00.897514 env[1212]: 2025-05-15 10:20:00.884 [INFO][2488] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:20:00.897514 env[1212]: 2025-05-15 10:20:00.893 [WARNING][2488] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="526fc4ff353274034be35edf75f382257422cd48fd76d9656c2fc3dc6115910a" HandleID="k8s-pod-network.526fc4ff353274034be35edf75f382257422cd48fd76d9656c2fc3dc6115910a" Workload="10.0.0.90-k8s-nginx--deployment--7fcdb87857--t64sk-eth0" May 15 10:20:00.897514 env[1212]: 2025-05-15 10:20:00.893 [INFO][2488] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="526fc4ff353274034be35edf75f382257422cd48fd76d9656c2fc3dc6115910a" HandleID="k8s-pod-network.526fc4ff353274034be35edf75f382257422cd48fd76d9656c2fc3dc6115910a" Workload="10.0.0.90-k8s-nginx--deployment--7fcdb87857--t64sk-eth0" May 15 10:20:00.897514 env[1212]: 2025-05-15 10:20:00.895 [INFO][2488] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:20:00.897514 env[1212]: 2025-05-15 10:20:00.896 [INFO][2479] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="526fc4ff353274034be35edf75f382257422cd48fd76d9656c2fc3dc6115910a" May 15 10:20:00.897920 env[1212]: time="2025-05-15T10:20:00.897593465Z" level=info msg="TearDown network for sandbox \"526fc4ff353274034be35edf75f382257422cd48fd76d9656c2fc3dc6115910a\" successfully" May 15 10:20:00.897920 env[1212]: time="2025-05-15T10:20:00.897632331Z" level=info msg="StopPodSandbox for \"526fc4ff353274034be35edf75f382257422cd48fd76d9656c2fc3dc6115910a\" returns successfully" May 15 10:20:00.898344 env[1212]: time="2025-05-15T10:20:00.898307402Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-t64sk,Uid:0fe06ad1-6af7-45a1-ba16-242227202423,Namespace:default,Attempt:1,}" May 15 10:20:00.917393 systemd[1]: run-containerd-runc-k8s.io-459215fbe2a1169ed393b3f5cf1975fac9a2781930c3e96c758f62124d78bf44-runc.zcyczq.mount: Deactivated successfully. May 15 10:20:00.917476 systemd[1]: run-netns-cni\x2db8510723\x2d1aec\x2d2415\x2d64f5\x2dd3e3184c7d2a.mount: Deactivated successfully. May 15 10:20:01.015238 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid9b5ae274ca: link becomes ready May 15 10:20:01.013583 systemd-networkd[1041]: calid9b5ae274ca: Link UP May 15 10:20:01.013795 systemd-networkd[1041]: calid9b5ae274ca: Gained carrier May 15 10:20:01.023284 env[1212]: 2025-05-15 10:20:00.946 [INFO][2495] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.90-k8s-nginx--deployment--7fcdb87857--t64sk-eth0 nginx-deployment-7fcdb87857- default 0fe06ad1-6af7-45a1-ba16-242227202423 1096 0 2025-05-15 10:19:46 +0000 UTC map[app:nginx pod-template-hash:7fcdb87857 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.90 nginx-deployment-7fcdb87857-t64sk eth0 default [] [] [kns.default ksa.default.default] calid9b5ae274ca [] []}} ContainerID="a3a632ead820394f27e9315d929c8494f709126c029c0490c0e1b66ea07df708" Namespace="default" Pod="nginx-deployment-7fcdb87857-t64sk" WorkloadEndpoint="10.0.0.90-k8s-nginx--deployment--7fcdb87857--t64sk-" May 15 10:20:01.023284 env[1212]: 2025-05-15 10:20:00.946 [INFO][2495] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="a3a632ead820394f27e9315d929c8494f709126c029c0490c0e1b66ea07df708" Namespace="default" Pod="nginx-deployment-7fcdb87857-t64sk" WorkloadEndpoint="10.0.0.90-k8s-nginx--deployment--7fcdb87857--t64sk-eth0" May 15 10:20:01.023284 env[1212]: 2025-05-15 10:20:00.969 [INFO][2511] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a3a632ead820394f27e9315d929c8494f709126c029c0490c0e1b66ea07df708" HandleID="k8s-pod-network.a3a632ead820394f27e9315d929c8494f709126c029c0490c0e1b66ea07df708" Workload="10.0.0.90-k8s-nginx--deployment--7fcdb87857--t64sk-eth0" May 15 10:20:01.023284 env[1212]: 2025-05-15 10:20:00.981 [INFO][2511] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a3a632ead820394f27e9315d929c8494f709126c029c0490c0e1b66ea07df708" HandleID="k8s-pod-network.a3a632ead820394f27e9315d929c8494f709126c029c0490c0e1b66ea07df708" Workload="10.0.0.90-k8s-nginx--deployment--7fcdb87857--t64sk-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40003aafd0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.90", "pod":"nginx-deployment-7fcdb87857-t64sk", "timestamp":"2025-05-15 10:20:00.969843112 +0000 UTC"}, Hostname:"10.0.0.90", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:20:01.023284 env[1212]: 2025-05-15 10:20:00.981 [INFO][2511] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:20:01.023284 env[1212]: 2025-05-15 10:20:00.981 [INFO][2511] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:20:01.023284 env[1212]: 2025-05-15 10:20:00.982 [INFO][2511] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.90' May 15 10:20:01.023284 env[1212]: 2025-05-15 10:20:00.986 [INFO][2511] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a3a632ead820394f27e9315d929c8494f709126c029c0490c0e1b66ea07df708" host="10.0.0.90" May 15 10:20:01.023284 env[1212]: 2025-05-15 10:20:00.990 [INFO][2511] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.90" May 15 10:20:01.023284 env[1212]: 2025-05-15 10:20:00.994 [INFO][2511] ipam/ipam.go 489: Trying affinity for 192.168.37.64/26 host="10.0.0.90" May 15 10:20:01.023284 env[1212]: 2025-05-15 10:20:00.996 [INFO][2511] ipam/ipam.go 155: Attempting to load block cidr=192.168.37.64/26 host="10.0.0.90" May 15 10:20:01.023284 env[1212]: 2025-05-15 10:20:00.998 [INFO][2511] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.37.64/26 host="10.0.0.90" May 15 10:20:01.023284 env[1212]: 2025-05-15 10:20:00.998 [INFO][2511] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.37.64/26 handle="k8s-pod-network.a3a632ead820394f27e9315d929c8494f709126c029c0490c0e1b66ea07df708" host="10.0.0.90" May 15 10:20:01.023284 env[1212]: 2025-05-15 10:20:01.000 [INFO][2511] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.a3a632ead820394f27e9315d929c8494f709126c029c0490c0e1b66ea07df708 May 15 10:20:01.023284 env[1212]: 2025-05-15 10:20:01.003 [INFO][2511] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.37.64/26 handle="k8s-pod-network.a3a632ead820394f27e9315d929c8494f709126c029c0490c0e1b66ea07df708" host="10.0.0.90" May 15 10:20:01.023284 env[1212]: 2025-05-15 10:20:01.008 [INFO][2511] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.37.66/26] block=192.168.37.64/26 handle="k8s-pod-network.a3a632ead820394f27e9315d929c8494f709126c029c0490c0e1b66ea07df708" host="10.0.0.90" May 15 10:20:01.023284 env[1212]: 2025-05-15 10:20:01.008 [INFO][2511] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.37.66/26] handle="k8s-pod-network.a3a632ead820394f27e9315d929c8494f709126c029c0490c0e1b66ea07df708" host="10.0.0.90" May 15 10:20:01.023284 env[1212]: 2025-05-15 10:20:01.008 [INFO][2511] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:20:01.023284 env[1212]: 2025-05-15 10:20:01.008 [INFO][2511] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.37.66/26] IPv6=[] ContainerID="a3a632ead820394f27e9315d929c8494f709126c029c0490c0e1b66ea07df708" HandleID="k8s-pod-network.a3a632ead820394f27e9315d929c8494f709126c029c0490c0e1b66ea07df708" Workload="10.0.0.90-k8s-nginx--deployment--7fcdb87857--t64sk-eth0" May 15 10:20:01.024188 env[1212]: 2025-05-15 10:20:01.010 [INFO][2495] cni-plugin/k8s.go 386: Populated endpoint ContainerID="a3a632ead820394f27e9315d929c8494f709126c029c0490c0e1b66ea07df708" Namespace="default" Pod="nginx-deployment-7fcdb87857-t64sk" WorkloadEndpoint="10.0.0.90-k8s-nginx--deployment--7fcdb87857--t64sk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.90-k8s-nginx--deployment--7fcdb87857--t64sk-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"0fe06ad1-6af7-45a1-ba16-242227202423", ResourceVersion:"1096", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 19, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.90", ContainerID:"", Pod:"nginx-deployment-7fcdb87857-t64sk", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.37.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calid9b5ae274ca", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:20:01.024188 env[1212]: 2025-05-15 10:20:01.010 [INFO][2495] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.37.66/32] ContainerID="a3a632ead820394f27e9315d929c8494f709126c029c0490c0e1b66ea07df708" Namespace="default" Pod="nginx-deployment-7fcdb87857-t64sk" WorkloadEndpoint="10.0.0.90-k8s-nginx--deployment--7fcdb87857--t64sk-eth0" May 15 10:20:01.024188 env[1212]: 2025-05-15 10:20:01.010 [INFO][2495] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calid9b5ae274ca ContainerID="a3a632ead820394f27e9315d929c8494f709126c029c0490c0e1b66ea07df708" Namespace="default" Pod="nginx-deployment-7fcdb87857-t64sk" WorkloadEndpoint="10.0.0.90-k8s-nginx--deployment--7fcdb87857--t64sk-eth0" May 15 10:20:01.024188 env[1212]: 2025-05-15 10:20:01.013 [INFO][2495] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a3a632ead820394f27e9315d929c8494f709126c029c0490c0e1b66ea07df708" Namespace="default" Pod="nginx-deployment-7fcdb87857-t64sk" WorkloadEndpoint="10.0.0.90-k8s-nginx--deployment--7fcdb87857--t64sk-eth0" May 15 10:20:01.024188 env[1212]: 2025-05-15 10:20:01.015 [INFO][2495] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="a3a632ead820394f27e9315d929c8494f709126c029c0490c0e1b66ea07df708" Namespace="default" Pod="nginx-deployment-7fcdb87857-t64sk" WorkloadEndpoint="10.0.0.90-k8s-nginx--deployment--7fcdb87857--t64sk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.90-k8s-nginx--deployment--7fcdb87857--t64sk-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"0fe06ad1-6af7-45a1-ba16-242227202423", ResourceVersion:"1096", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 19, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.90", ContainerID:"a3a632ead820394f27e9315d929c8494f709126c029c0490c0e1b66ea07df708", Pod:"nginx-deployment-7fcdb87857-t64sk", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.37.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calid9b5ae274ca", MAC:"66:3f:cf:9b:aa:b2", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:20:01.024188 env[1212]: 2025-05-15 10:20:01.021 [INFO][2495] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="a3a632ead820394f27e9315d929c8494f709126c029c0490c0e1b66ea07df708" Namespace="default" Pod="nginx-deployment-7fcdb87857-t64sk" WorkloadEndpoint="10.0.0.90-k8s-nginx--deployment--7fcdb87857--t64sk-eth0" May 15 10:20:01.030000 audit[2535]: NETFILTER_CFG table=filter:80 family=2 entries=38 op=nft_register_chain pid=2535 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:20:01.030000 audit[2535]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20312 a0=3 a1=ffffe060be90 a2=0 a3=ffffa7f2ffa8 items=0 ppid=2127 pid=2535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:01.030000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:20:01.033378 env[1212]: time="2025-05-15T10:20:01.033315934Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:20:01.033378 env[1212]: time="2025-05-15T10:20:01.033354120Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:20:01.033378 env[1212]: time="2025-05-15T10:20:01.033364077Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:20:01.033553 env[1212]: time="2025-05-15T10:20:01.033514225Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a3a632ead820394f27e9315d929c8494f709126c029c0490c0e1b66ea07df708 pid=2539 runtime=io.containerd.runc.v2 May 15 10:20:01.050094 systemd[1]: run-containerd-runc-k8s.io-a3a632ead820394f27e9315d929c8494f709126c029c0490c0e1b66ea07df708-runc.m64uhL.mount: Deactivated successfully. May 15 10:20:01.051535 systemd[1]: Started cri-containerd-a3a632ead820394f27e9315d929c8494f709126c029c0490c0e1b66ea07df708.scope. May 15 10:20:01.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:01.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:01.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:01.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:01.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:01.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:01.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:01.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:01.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:01.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:01.074000 audit: BPF prog-id=104 op=LOAD May 15 10:20:01.074000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:01.074000 audit[2549]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001b3b38 a2=10 a3=0 items=0 ppid=2539 pid=2549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:01.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133613633326561643832303339346632376539333135643932396338 May 15 10:20:01.074000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:01.074000 audit[2549]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001b35a0 a2=3c a3=0 items=0 ppid=2539 pid=2549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:01.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133613633326561643832303339346632376539333135643932396338 May 15 10:20:01.075000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:01.075000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:01.075000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:01.075000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:01.075000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:01.075000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:01.075000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:01.075000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:01.075000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:01.075000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:01.075000 audit: BPF prog-id=105 op=LOAD May 15 10:20:01.075000 audit[2549]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001b38e0 a2=78 a3=0 items=0 ppid=2539 pid=2549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:01.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133613633326561643832303339346632376539333135643932396338 May 15 10:20:01.075000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:01.075000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:01.075000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:01.075000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:01.075000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:01.075000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:01.075000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:01.075000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:01.075000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:01.075000 audit: BPF prog-id=106 op=LOAD May 15 10:20:01.075000 audit[2549]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001b3670 a2=78 a3=0 items=0 ppid=2539 pid=2549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:01.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133613633326561643832303339346632376539333135643932396338 May 15 10:20:01.076000 audit: BPF prog-id=106 op=UNLOAD May 15 10:20:01.076000 audit: BPF prog-id=105 op=UNLOAD May 15 10:20:01.076000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:01.076000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:01.076000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:01.076000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:01.076000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:01.076000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:01.076000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:01.076000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:01.076000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:01.076000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:01.076000 audit: BPF prog-id=107 op=LOAD May 15 10:20:01.076000 audit[2549]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001b3b40 a2=78 a3=0 items=0 ppid=2539 pid=2549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:01.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133613633326561643832303339346632376539333135643932396338 May 15 10:20:01.078816 systemd-resolved[1155]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:20:01.094017 env[1212]: time="2025-05-15T10:20:01.093981448Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-t64sk,Uid:0fe06ad1-6af7-45a1-ba16-242227202423,Namespace:default,Attempt:1,} returns sandbox id \"a3a632ead820394f27e9315d929c8494f709126c029c0490c0e1b66ea07df708\"" May 15 10:20:01.619971 kubelet[1450]: E0515 10:20:01.619936 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:20:01.811413 systemd-networkd[1041]: cali0be95f00492: Gained IPv6LL May 15 10:20:02.451878 systemd-networkd[1041]: calid9b5ae274ca: Gained IPv6LL May 15 10:20:02.621024 kubelet[1450]: E0515 10:20:02.620956 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:20:03.621901 kubelet[1450]: E0515 10:20:03.621860 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:20:03.977172 env[1212]: time="2025-05-15T10:20:03.977132666Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:20:03.979044 env[1212]: time="2025-05-15T10:20:03.979010096Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:15faf29e8b518d846c91c15785ff89e783d356ea0f2b22826f47a556ea32645b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:20:03.980677 env[1212]: time="2025-05-15T10:20:03.980643759Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:20:03.986073 env[1212]: time="2025-05-15T10:20:03.986021366Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:20:03.987002 env[1212]: time="2025-05-15T10:20:03.986964400Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:15faf29e8b518d846c91c15785ff89e783d356ea0f2b22826f47a556ea32645b\"" May 15 10:20:03.988457 env[1212]: time="2025-05-15T10:20:03.988434033Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 15 10:20:03.989100 env[1212]: time="2025-05-15T10:20:03.989051206Z" level=info msg="CreateContainer within sandbox \"459215fbe2a1169ed393b3f5cf1975fac9a2781930c3e96c758f62124d78bf44\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 15 10:20:04.003239 env[1212]: time="2025-05-15T10:20:04.003189829Z" level=info msg="CreateContainer within sandbox \"459215fbe2a1169ed393b3f5cf1975fac9a2781930c3e96c758f62124d78bf44\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"f38d1ba282d73b52dc8ae1aab25858486cafbf0905a2c8c6d9dd6e8aeb4737e7\"" May 15 10:20:04.003707 env[1212]: time="2025-05-15T10:20:04.003683289Z" level=info msg="StartContainer for \"f38d1ba282d73b52dc8ae1aab25858486cafbf0905a2c8c6d9dd6e8aeb4737e7\"" May 15 10:20:04.023660 systemd[1]: Started cri-containerd-f38d1ba282d73b52dc8ae1aab25858486cafbf0905a2c8c6d9dd6e8aeb4737e7.scope. May 15 10:20:04.042000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:04.044221 kernel: kauditd_printk_skb: 116 callbacks suppressed May 15 10:20:04.044275 kernel: audit: type=1400 audit(1747304404.042:688): avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:04.042000 audit[2585]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2431 pid=2585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:04.050141 kernel: audit: type=1300 audit(1747304404.042:688): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2431 pid=2585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:04.050268 kernel: audit: type=1327 audit(1747304404.042:688): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633386431626132383264373362353264633861653161616232353835 May 15 10:20:04.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633386431626132383264373362353264633861653161616232353835 May 15 10:20:04.042000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:04.055924 kernel: audit: type=1400 audit(1747304404.042:689): avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:04.042000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:04.059121 kernel: audit: type=1400 audit(1747304404.042:689): avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:04.059249 kernel: audit: type=1400 audit(1747304404.042:689): avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:04.042000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:04.042000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:04.064016 kernel: audit: type=1400 audit(1747304404.042:689): avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:04.064216 kernel: audit: type=1400 audit(1747304404.042:689): avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:04.042000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:04.042000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:04.069220 kernel: audit: type=1400 audit(1747304404.042:689): avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:04.069301 kernel: audit: type=1400 audit(1747304404.042:689): avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:04.042000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:04.042000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:04.042000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:04.042000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:04.042000 audit: BPF prog-id=108 op=LOAD May 15 10:20:04.042000 audit[2585]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2431 pid=2585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:04.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633386431626132383264373362353264633861653161616232353835 May 15 10:20:04.043000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:04.043000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:04.043000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:04.043000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:04.043000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:04.043000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:04.043000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:04.043000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:04.043000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:04.043000 audit: BPF prog-id=109 op=LOAD May 15 10:20:04.043000 audit[2585]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2431 pid=2585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:04.043000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633386431626132383264373362353264633861653161616232353835 May 15 10:20:04.045000 audit: BPF prog-id=109 op=UNLOAD May 15 10:20:04.045000 audit: BPF prog-id=108 op=UNLOAD May 15 10:20:04.045000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:04.045000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:04.045000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:04.045000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:04.045000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:04.045000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:04.045000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:04.045000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:04.045000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:04.045000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:04.045000 audit: BPF prog-id=110 op=LOAD May 15 10:20:04.045000 audit[2585]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2431 pid=2585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:04.045000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633386431626132383264373362353264633861653161616232353835 May 15 10:20:04.073383 env[1212]: time="2025-05-15T10:20:04.073347453Z" level=info msg="StartContainer for \"f38d1ba282d73b52dc8ae1aab25858486cafbf0905a2c8c6d9dd6e8aeb4737e7\" returns successfully" May 15 10:20:04.622915 kubelet[1450]: E0515 10:20:04.622864 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:20:05.356000 audit[2612]: NETFILTER_CFG table=filter:81 family=2 entries=8 op=nft_register_rule pid=2612 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:20:05.356000 audit[2612]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffc3f0a860 a2=0 a3=1 items=0 ppid=1668 pid=2612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:05.356000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:20:05.365000 audit[2612]: NETFILTER_CFG table=nat:82 family=2 entries=34 op=nft_register_chain pid=2612 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:20:05.365000 audit[2612]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=ffffc3f0a860 a2=0 a3=1 items=0 ppid=1668 pid=2612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:05.365000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:20:05.384000 audit[2614]: NETFILTER_CFG table=filter:83 family=2 entries=8 op=nft_register_rule pid=2614 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:20:05.384000 audit[2614]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffc08bc660 a2=0 a3=1 items=0 ppid=1668 pid=2614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:05.384000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:20:05.393000 audit[2614]: NETFILTER_CFG table=nat:84 family=2 entries=36 op=nft_register_rule pid=2614 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:20:05.393000 audit[2614]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=ffffc08bc660 a2=0 a3=1 items=0 ppid=1668 pid=2614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:05.393000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:20:05.399641 kubelet[1450]: I0515 10:20:05.399527 1450 status_manager.go:890] "Failed to get status for pod" podUID="fff53ed3-4a50-49f0-97ea-800319de711c" pod="calico-apiserver/calico-apiserver-78d645f96f-zbd97" err="pods \"calico-apiserver-78d645f96f-zbd97\" is forbidden: User \"system:node:10.0.0.90\" cannot get resource \"pods\" in API group \"\" in the namespace \"calico-apiserver\": no relationship found between node '10.0.0.90' and this object" May 15 10:20:05.403569 systemd[1]: Created slice kubepods-besteffort-podfff53ed3_4a50_49f0_97ea_800319de711c.slice. May 15 10:20:05.500026 kubelet[1450]: I0515 10:20:05.499943 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-flr9t\" (UniqueName: \"kubernetes.io/projected/fff53ed3-4a50-49f0-97ea-800319de711c-kube-api-access-flr9t\") pod \"calico-apiserver-78d645f96f-zbd97\" (UID: \"fff53ed3-4a50-49f0-97ea-800319de711c\") " pod="calico-apiserver/calico-apiserver-78d645f96f-zbd97" May 15 10:20:05.500026 kubelet[1450]: I0515 10:20:05.500000 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/fff53ed3-4a50-49f0-97ea-800319de711c-calico-apiserver-certs\") pod \"calico-apiserver-78d645f96f-zbd97\" (UID: \"fff53ed3-4a50-49f0-97ea-800319de711c\") " pod="calico-apiserver/calico-apiserver-78d645f96f-zbd97" May 15 10:20:05.623332 kubelet[1450]: E0515 10:20:05.623189 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:20:05.706264 env[1212]: time="2025-05-15T10:20:05.706222345Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-78d645f96f-zbd97,Uid:fff53ed3-4a50-49f0-97ea-800319de711c,Namespace:calico-apiserver,Attempt:0,}" May 15 10:20:05.831643 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 10:20:05.831755 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali74d13dfd066: link becomes ready May 15 10:20:05.831755 systemd-networkd[1041]: cali74d13dfd066: Link UP May 15 10:20:05.831930 systemd-networkd[1041]: cali74d13dfd066: Gained carrier May 15 10:20:05.842675 env[1212]: 2025-05-15 10:20:05.766 [INFO][2619] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.90-k8s-calico--apiserver--78d645f96f--zbd97-eth0 calico-apiserver-78d645f96f- calico-apiserver fff53ed3-4a50-49f0-97ea-800319de711c 1136 0 2025-05-15 10:20:05 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:78d645f96f projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s 10.0.0.90 calico-apiserver-78d645f96f-zbd97 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali74d13dfd066 [] []}} ContainerID="af6efac3a6f29e92012ab2b05a49992464a659b3eb7ec8cf579d1f0b962c0f81" Namespace="calico-apiserver" Pod="calico-apiserver-78d645f96f-zbd97" WorkloadEndpoint="10.0.0.90-k8s-calico--apiserver--78d645f96f--zbd97-" May 15 10:20:05.842675 env[1212]: 2025-05-15 10:20:05.766 [INFO][2619] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="af6efac3a6f29e92012ab2b05a49992464a659b3eb7ec8cf579d1f0b962c0f81" Namespace="calico-apiserver" Pod="calico-apiserver-78d645f96f-zbd97" WorkloadEndpoint="10.0.0.90-k8s-calico--apiserver--78d645f96f--zbd97-eth0" May 15 10:20:05.842675 env[1212]: 2025-05-15 10:20:05.792 [INFO][2636] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="af6efac3a6f29e92012ab2b05a49992464a659b3eb7ec8cf579d1f0b962c0f81" HandleID="k8s-pod-network.af6efac3a6f29e92012ab2b05a49992464a659b3eb7ec8cf579d1f0b962c0f81" Workload="10.0.0.90-k8s-calico--apiserver--78d645f96f--zbd97-eth0" May 15 10:20:05.842675 env[1212]: 2025-05-15 10:20:05.803 [INFO][2636] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="af6efac3a6f29e92012ab2b05a49992464a659b3eb7ec8cf579d1f0b962c0f81" HandleID="k8s-pod-network.af6efac3a6f29e92012ab2b05a49992464a659b3eb7ec8cf579d1f0b962c0f81" Workload="10.0.0.90-k8s-calico--apiserver--78d645f96f--zbd97-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400019c0e0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"10.0.0.90", "pod":"calico-apiserver-78d645f96f-zbd97", "timestamp":"2025-05-15 10:20:05.79221591 +0000 UTC"}, Hostname:"10.0.0.90", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:20:05.842675 env[1212]: 2025-05-15 10:20:05.803 [INFO][2636] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:20:05.842675 env[1212]: 2025-05-15 10:20:05.803 [INFO][2636] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:20:05.842675 env[1212]: 2025-05-15 10:20:05.803 [INFO][2636] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.90' May 15 10:20:05.842675 env[1212]: 2025-05-15 10:20:05.806 [INFO][2636] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.af6efac3a6f29e92012ab2b05a49992464a659b3eb7ec8cf579d1f0b962c0f81" host="10.0.0.90" May 15 10:20:05.842675 env[1212]: 2025-05-15 10:20:05.810 [INFO][2636] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.90" May 15 10:20:05.842675 env[1212]: 2025-05-15 10:20:05.814 [INFO][2636] ipam/ipam.go 489: Trying affinity for 192.168.37.64/26 host="10.0.0.90" May 15 10:20:05.842675 env[1212]: 2025-05-15 10:20:05.815 [INFO][2636] ipam/ipam.go 155: Attempting to load block cidr=192.168.37.64/26 host="10.0.0.90" May 15 10:20:05.842675 env[1212]: 2025-05-15 10:20:05.817 [INFO][2636] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.37.64/26 host="10.0.0.90" May 15 10:20:05.842675 env[1212]: 2025-05-15 10:20:05.817 [INFO][2636] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.37.64/26 handle="k8s-pod-network.af6efac3a6f29e92012ab2b05a49992464a659b3eb7ec8cf579d1f0b962c0f81" host="10.0.0.90" May 15 10:20:05.842675 env[1212]: 2025-05-15 10:20:05.818 [INFO][2636] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.af6efac3a6f29e92012ab2b05a49992464a659b3eb7ec8cf579d1f0b962c0f81 May 15 10:20:05.842675 env[1212]: 2025-05-15 10:20:05.822 [INFO][2636] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.37.64/26 handle="k8s-pod-network.af6efac3a6f29e92012ab2b05a49992464a659b3eb7ec8cf579d1f0b962c0f81" host="10.0.0.90" May 15 10:20:05.842675 env[1212]: 2025-05-15 10:20:05.826 [INFO][2636] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.37.67/26] block=192.168.37.64/26 handle="k8s-pod-network.af6efac3a6f29e92012ab2b05a49992464a659b3eb7ec8cf579d1f0b962c0f81" host="10.0.0.90" May 15 10:20:05.842675 env[1212]: 2025-05-15 10:20:05.827 [INFO][2636] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.37.67/26] handle="k8s-pod-network.af6efac3a6f29e92012ab2b05a49992464a659b3eb7ec8cf579d1f0b962c0f81" host="10.0.0.90" May 15 10:20:05.842675 env[1212]: 2025-05-15 10:20:05.827 [INFO][2636] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:20:05.842675 env[1212]: 2025-05-15 10:20:05.827 [INFO][2636] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.37.67/26] IPv6=[] ContainerID="af6efac3a6f29e92012ab2b05a49992464a659b3eb7ec8cf579d1f0b962c0f81" HandleID="k8s-pod-network.af6efac3a6f29e92012ab2b05a49992464a659b3eb7ec8cf579d1f0b962c0f81" Workload="10.0.0.90-k8s-calico--apiserver--78d645f96f--zbd97-eth0" May 15 10:20:05.843231 env[1212]: 2025-05-15 10:20:05.828 [INFO][2619] cni-plugin/k8s.go 386: Populated endpoint ContainerID="af6efac3a6f29e92012ab2b05a49992464a659b3eb7ec8cf579d1f0b962c0f81" Namespace="calico-apiserver" Pod="calico-apiserver-78d645f96f-zbd97" WorkloadEndpoint="10.0.0.90-k8s-calico--apiserver--78d645f96f--zbd97-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.90-k8s-calico--apiserver--78d645f96f--zbd97-eth0", GenerateName:"calico-apiserver-78d645f96f-", Namespace:"calico-apiserver", SelfLink:"", UID:"fff53ed3-4a50-49f0-97ea-800319de711c", ResourceVersion:"1136", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 20, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"78d645f96f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.90", ContainerID:"", Pod:"calico-apiserver-78d645f96f-zbd97", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.37.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali74d13dfd066", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:20:05.843231 env[1212]: 2025-05-15 10:20:05.828 [INFO][2619] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.37.67/32] ContainerID="af6efac3a6f29e92012ab2b05a49992464a659b3eb7ec8cf579d1f0b962c0f81" Namespace="calico-apiserver" Pod="calico-apiserver-78d645f96f-zbd97" WorkloadEndpoint="10.0.0.90-k8s-calico--apiserver--78d645f96f--zbd97-eth0" May 15 10:20:05.843231 env[1212]: 2025-05-15 10:20:05.828 [INFO][2619] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali74d13dfd066 ContainerID="af6efac3a6f29e92012ab2b05a49992464a659b3eb7ec8cf579d1f0b962c0f81" Namespace="calico-apiserver" Pod="calico-apiserver-78d645f96f-zbd97" WorkloadEndpoint="10.0.0.90-k8s-calico--apiserver--78d645f96f--zbd97-eth0" May 15 10:20:05.843231 env[1212]: 2025-05-15 10:20:05.832 [INFO][2619] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="af6efac3a6f29e92012ab2b05a49992464a659b3eb7ec8cf579d1f0b962c0f81" Namespace="calico-apiserver" Pod="calico-apiserver-78d645f96f-zbd97" WorkloadEndpoint="10.0.0.90-k8s-calico--apiserver--78d645f96f--zbd97-eth0" May 15 10:20:05.843231 env[1212]: 2025-05-15 10:20:05.832 [INFO][2619] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="af6efac3a6f29e92012ab2b05a49992464a659b3eb7ec8cf579d1f0b962c0f81" Namespace="calico-apiserver" Pod="calico-apiserver-78d645f96f-zbd97" WorkloadEndpoint="10.0.0.90-k8s-calico--apiserver--78d645f96f--zbd97-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.90-k8s-calico--apiserver--78d645f96f--zbd97-eth0", GenerateName:"calico-apiserver-78d645f96f-", Namespace:"calico-apiserver", SelfLink:"", UID:"fff53ed3-4a50-49f0-97ea-800319de711c", ResourceVersion:"1136", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 20, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"78d645f96f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.90", ContainerID:"af6efac3a6f29e92012ab2b05a49992464a659b3eb7ec8cf579d1f0b962c0f81", Pod:"calico-apiserver-78d645f96f-zbd97", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.37.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali74d13dfd066", MAC:"1e:4b:07:85:a6:40", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:20:05.843231 env[1212]: 2025-05-15 10:20:05.838 [INFO][2619] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="af6efac3a6f29e92012ab2b05a49992464a659b3eb7ec8cf579d1f0b962c0f81" Namespace="calico-apiserver" Pod="calico-apiserver-78d645f96f-zbd97" WorkloadEndpoint="10.0.0.90-k8s-calico--apiserver--78d645f96f--zbd97-eth0" May 15 10:20:05.852000 audit[2658]: NETFILTER_CFG table=filter:85 family=2 entries=48 op=nft_register_chain pid=2658 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:20:05.852000 audit[2658]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=25868 a0=3 a1=ffffcdc71e50 a2=0 a3=ffff87c46fa8 items=0 ppid=2127 pid=2658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:05.852000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:20:05.863479 env[1212]: time="2025-05-15T10:20:05.863396229Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:20:05.863479 env[1212]: time="2025-05-15T10:20:05.863476168Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:20:05.863627 env[1212]: time="2025-05-15T10:20:05.863503681Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:20:05.863780 env[1212]: time="2025-05-15T10:20:05.863725861Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/af6efac3a6f29e92012ab2b05a49992464a659b3eb7ec8cf579d1f0b962c0f81 pid=2666 runtime=io.containerd.runc.v2 May 15 10:20:05.873717 systemd[1]: Started cri-containerd-af6efac3a6f29e92012ab2b05a49992464a659b3eb7ec8cf579d1f0b962c0f81.scope. May 15 10:20:05.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:05.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:05.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:05.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:05.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:05.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:05.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:05.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:05.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:05.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:05.900000 audit: BPF prog-id=111 op=LOAD May 15 10:20:05.900000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:05.900000 audit[2679]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2666 pid=2679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:05.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166366566616333613666323965393230313261623262303561343939 May 15 10:20:05.900000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:05.900000 audit[2679]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2666 pid=2679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:05.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166366566616333613666323965393230313261623262303561343939 May 15 10:20:05.901000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:05.901000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:05.901000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:05.901000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:05.901000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:05.901000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:05.901000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:05.901000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:05.901000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:05.901000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:05.901000 audit: BPF prog-id=112 op=LOAD May 15 10:20:05.901000 audit[2679]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2666 pid=2679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:05.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166366566616333613666323965393230313261623262303561343939 May 15 10:20:05.901000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:05.901000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:05.901000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:05.901000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:05.901000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:05.901000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:05.901000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:05.901000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:05.901000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:05.901000 audit: BPF prog-id=113 op=LOAD May 15 10:20:05.901000 audit[2679]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2666 pid=2679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:05.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166366566616333613666323965393230313261623262303561343939 May 15 10:20:05.901000 audit: BPF prog-id=113 op=UNLOAD May 15 10:20:05.901000 audit: BPF prog-id=112 op=UNLOAD May 15 10:20:05.901000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:05.901000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:05.901000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:05.901000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:05.901000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:05.901000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:05.901000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:05.901000 audit[2679]: AVC avc: denied { perfmon } for pid=2679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:05.901000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:05.901000 audit[2679]: AVC avc: denied { bpf } for pid=2679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:05.901000 audit: BPF prog-id=114 op=LOAD May 15 10:20:05.901000 audit[2679]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2666 pid=2679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:05.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166366566616333613666323965393230313261623262303561343939 May 15 10:20:05.903786 systemd-resolved[1155]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:20:05.918821 env[1212]: time="2025-05-15T10:20:05.918776926Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-78d645f96f-zbd97,Uid:fff53ed3-4a50-49f0-97ea-800319de711c,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"af6efac3a6f29e92012ab2b05a49992464a659b3eb7ec8cf579d1f0b962c0f81\"" May 15 10:20:06.356130 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2462653151.mount: Deactivated successfully. May 15 10:20:06.408000 audit[2702]: NETFILTER_CFG table=filter:86 family=2 entries=8 op=nft_register_rule pid=2702 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:20:06.408000 audit[2702]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffcdddbe50 a2=0 a3=1 items=0 ppid=1668 pid=2702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:06.408000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:20:06.421000 audit[2702]: NETFILTER_CFG table=nat:87 family=2 entries=36 op=nft_register_rule pid=2702 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:20:06.421000 audit[2702]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=ffffcdddbe50 a2=0 a3=1 items=0 ppid=1668 pid=2702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:06.421000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:20:06.623978 kubelet[1450]: E0515 10:20:06.623852 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:20:07.059340 systemd-networkd[1041]: cali74d13dfd066: Gained IPv6LL May 15 10:20:07.513462 env[1212]: time="2025-05-15T10:20:07.513423203Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:20:07.515532 env[1212]: time="2025-05-15T10:20:07.515505915Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e8b1cb61bd96acc3ff3c695318c9cc691213d532eee3731d038af92816fcb5f4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:20:07.517240 env[1212]: time="2025-05-15T10:20:07.517215753Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:20:07.519459 env[1212]: time="2025-05-15T10:20:07.519429394Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:20:07.520143 env[1212]: time="2025-05-15T10:20:07.520117513Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:e8b1cb61bd96acc3ff3c695318c9cc691213d532eee3731d038af92816fcb5f4\"" May 15 10:20:07.522029 env[1212]: time="2025-05-15T10:20:07.522003350Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 15 10:20:07.522577 env[1212]: time="2025-05-15T10:20:07.522540864Z" level=info msg="CreateContainer within sandbox \"a3a632ead820394f27e9315d929c8494f709126c029c0490c0e1b66ea07df708\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" May 15 10:20:07.531931 env[1212]: time="2025-05-15T10:20:07.531876994Z" level=info msg="CreateContainer within sandbox \"a3a632ead820394f27e9315d929c8494f709126c029c0490c0e1b66ea07df708\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"5972522ba9dd545cde85d50682e0c1e9da4291d7e9e3071287e4415197ce11bc\"" May 15 10:20:07.532443 env[1212]: time="2025-05-15T10:20:07.532399631Z" level=info msg="StartContainer for \"5972522ba9dd545cde85d50682e0c1e9da4291d7e9e3071287e4415197ce11bc\"" May 15 10:20:07.550970 systemd[1]: Started cri-containerd-5972522ba9dd545cde85d50682e0c1e9da4291d7e9e3071287e4415197ce11bc.scope. May 15 10:20:07.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:07.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:07.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:07.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:07.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:07.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:07.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:07.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:07.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:07.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:07.574000 audit: BPF prog-id=115 op=LOAD May 15 10:20:07.574000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:07.574000 audit[2711]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2539 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:07.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539373235323262613964643534356364653835643530363832653063 May 15 10:20:07.574000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:07.574000 audit[2711]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2539 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:07.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539373235323262613964643534356364653835643530363832653063 May 15 10:20:07.574000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:07.574000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:07.574000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:07.574000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:07.574000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:07.574000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:07.574000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:07.574000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:07.574000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:07.574000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:07.574000 audit: BPF prog-id=116 op=LOAD May 15 10:20:07.574000 audit[2711]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2539 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:07.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539373235323262613964643534356364653835643530363832653063 May 15 10:20:07.574000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:07.574000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:07.574000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:07.574000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:07.574000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:07.574000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:07.574000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:07.574000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:07.574000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:07.574000 audit: BPF prog-id=117 op=LOAD May 15 10:20:07.574000 audit[2711]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2539 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:07.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539373235323262613964643534356364653835643530363832653063 May 15 10:20:07.574000 audit: BPF prog-id=117 op=UNLOAD May 15 10:20:07.574000 audit: BPF prog-id=116 op=UNLOAD May 15 10:20:07.574000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:07.574000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:07.574000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:07.574000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:07.574000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:07.574000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:07.574000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:07.574000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:07.574000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:07.574000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:07.574000 audit: BPF prog-id=118 op=LOAD May 15 10:20:07.574000 audit[2711]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2539 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:07.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539373235323262613964643534356364653835643530363832653063 May 15 10:20:07.598641 env[1212]: time="2025-05-15T10:20:07.598446456Z" level=info msg="StartContainer for \"5972522ba9dd545cde85d50682e0c1e9da4291d7e9e3071287e4415197ce11bc\" returns successfully" May 15 10:20:07.624561 kubelet[1450]: E0515 10:20:07.624156 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:20:07.888208 kubelet[1450]: I0515 10:20:07.888043 1450 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-7fcdb87857-t64sk" podStartSLOduration=15.461713709 podStartE2EDuration="21.88802732s" podCreationTimestamp="2025-05-15 10:19:46 +0000 UTC" firstStartedPulling="2025-05-15 10:20:01.094959151 +0000 UTC m=+27.200461374" lastFinishedPulling="2025-05-15 10:20:07.521272762 +0000 UTC m=+33.626774985" observedRunningTime="2025-05-15 10:20:07.887849801 +0000 UTC m=+33.993352024" watchObservedRunningTime="2025-05-15 10:20:07.88802732 +0000 UTC m=+33.993529503" May 15 10:20:08.624760 kubelet[1450]: E0515 10:20:08.624707 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:20:09.625892 kubelet[1450]: E0515 10:20:09.625841 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:20:09.831952 env[1212]: time="2025-05-15T10:20:09.831903110Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:20:09.833636 env[1212]: time="2025-05-15T10:20:09.833599880Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a91b1f00752edc175f270a01b33683fa80818734aa2274388785eaf3364315dc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:20:09.835294 env[1212]: time="2025-05-15T10:20:09.835246620Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:20:09.836611 env[1212]: time="2025-05-15T10:20:09.836580745Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:20:09.837076 env[1212]: time="2025-05-15T10:20:09.837044490Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:a91b1f00752edc175f270a01b33683fa80818734aa2274388785eaf3364315dc\"" May 15 10:20:09.838419 env[1212]: time="2025-05-15T10:20:09.838391932Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 15 10:20:09.839167 env[1212]: time="2025-05-15T10:20:09.839132899Z" level=info msg="CreateContainer within sandbox \"459215fbe2a1169ed393b3f5cf1975fac9a2781930c3e96c758f62124d78bf44\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 15 10:20:09.850512 env[1212]: time="2025-05-15T10:20:09.850468962Z" level=info msg="CreateContainer within sandbox \"459215fbe2a1169ed393b3f5cf1975fac9a2781930c3e96c758f62124d78bf44\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"83cf5bee56f64763b1d97a9b9f1e4894feab3cd6ce50c5b541a5c948df2670f7\"" May 15 10:20:09.851346 env[1212]: time="2025-05-15T10:20:09.851307789Z" level=info msg="StartContainer for \"83cf5bee56f64763b1d97a9b9f1e4894feab3cd6ce50c5b541a5c948df2670f7\"" May 15 10:20:09.872493 systemd[1]: Started cri-containerd-83cf5bee56f64763b1d97a9b9f1e4894feab3cd6ce50c5b541a5c948df2670f7.scope. May 15 10:20:09.874025 systemd[1]: run-containerd-runc-k8s.io-83cf5bee56f64763b1d97a9b9f1e4894feab3cd6ce50c5b541a5c948df2670f7-runc.r06ake.mount: Deactivated successfully. May 15 10:20:09.910302 kernel: kauditd_printk_skb: 168 callbacks suppressed May 15 10:20:09.910436 kernel: audit: type=1400 audit(1747304409.901:737): avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:09.910471 kernel: audit: type=1300 audit(1747304409.901:737): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2431 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:09.910494 kernel: audit: type=1327 audit(1747304409.901:737): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833636635626565353666363437363362316439376139623966316534 May 15 10:20:09.901000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:09.901000 audit[2769]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2431 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:09.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833636635626565353666363437363362316439376139623966316534 May 15 10:20:09.901000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:09.916005 kernel: audit: type=1400 audit(1747304409.901:738): avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:09.916076 kernel: audit: type=1400 audit(1747304409.901:738): avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:09.901000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:09.901000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:09.921601 kernel: audit: type=1400 audit(1747304409.901:738): avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:09.921671 kernel: audit: type=1400 audit(1747304409.901:738): avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:09.901000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:09.901000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:09.926818 kernel: audit: type=1400 audit(1747304409.901:738): avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:09.927263 kernel: audit: type=1400 audit(1747304409.901:738): avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:09.929798 kernel: audit: type=1400 audit(1747304409.901:738): avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:09.901000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:09.901000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:09.901000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:09.901000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:09.901000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:09.901000 audit: BPF prog-id=119 op=LOAD May 15 10:20:09.901000 audit[2769]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2431 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:09.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833636635626565353666363437363362316439376139623966316534 May 15 10:20:09.902000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:09.902000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:09.902000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:09.902000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:09.902000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:09.902000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:09.902000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:09.902000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:09.902000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:09.902000 audit: BPF prog-id=120 op=LOAD May 15 10:20:09.902000 audit[2769]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2431 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:09.902000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833636635626565353666363437363362316439376139623966316534 May 15 10:20:09.904000 audit: BPF prog-id=120 op=UNLOAD May 15 10:20:09.904000 audit: BPF prog-id=119 op=UNLOAD May 15 10:20:09.904000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:09.904000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:09.904000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:09.904000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:09.904000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:09.904000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:09.904000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:09.904000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:09.904000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:09.904000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:09.904000 audit: BPF prog-id=121 op=LOAD May 15 10:20:09.904000 audit[2769]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2431 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:09.904000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833636635626565353666363437363362316439376139623966316534 May 15 10:20:09.933567 env[1212]: time="2025-05-15T10:20:09.932905044Z" level=info msg="StartContainer for \"83cf5bee56f64763b1d97a9b9f1e4894feab3cd6ce50c5b541a5c948df2670f7\" returns successfully" May 15 10:20:10.626887 kubelet[1450]: E0515 10:20:10.626817 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:20:10.807457 kubelet[1450]: I0515 10:20:10.807326 1450 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 15 10:20:10.807457 kubelet[1450]: I0515 10:20:10.807356 1450 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 15 10:20:10.907914 kubelet[1450]: I0515 10:20:10.906912 1450 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-qvt4t" podStartSLOduration=27.173111413 podStartE2EDuration="36.906890548s" podCreationTimestamp="2025-05-15 10:19:34 +0000 UTC" firstStartedPulling="2025-05-15 10:20:00.104036996 +0000 UTC m=+26.209539179" lastFinishedPulling="2025-05-15 10:20:09.837816131 +0000 UTC m=+35.943318314" observedRunningTime="2025-05-15 10:20:10.902445007 +0000 UTC m=+37.007947230" watchObservedRunningTime="2025-05-15 10:20:10.906890548 +0000 UTC m=+37.012392771" May 15 10:20:11.627495 kubelet[1450]: E0515 10:20:11.627438 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:20:11.965797 update_engine[1203]: I0515 10:20:11.965654 1203 update_attempter.cc:509] Updating boot flags... May 15 10:20:12.420053 env[1212]: time="2025-05-15T10:20:12.420004654Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:20:12.422091 env[1212]: time="2025-05-15T10:20:12.422032110Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:eca64fb9fcc40e83ed2310ac1fab340ba460a939c54e10dc0b7428f02b9b6253,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:20:12.424261 env[1212]: time="2025-05-15T10:20:12.424223617Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:20:12.425483 env[1212]: time="2025-05-15T10:20:12.425456128Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:20:12.426102 env[1212]: time="2025-05-15T10:20:12.426066864Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:eca64fb9fcc40e83ed2310ac1fab340ba460a939c54e10dc0b7428f02b9b6253\"" May 15 10:20:12.428613 env[1212]: time="2025-05-15T10:20:12.428574478Z" level=info msg="CreateContainer within sandbox \"af6efac3a6f29e92012ab2b05a49992464a659b3eb7ec8cf579d1f0b962c0f81\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 15 10:20:12.438630 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3707163394.mount: Deactivated successfully. May 15 10:20:12.440793 env[1212]: time="2025-05-15T10:20:12.440749770Z" level=info msg="CreateContainer within sandbox \"af6efac3a6f29e92012ab2b05a49992464a659b3eb7ec8cf579d1f0b962c0f81\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"eb7492389b70738a55ddee6c98a218e509867f13ae8ca10deadf07f854e6afb6\"" May 15 10:20:12.441597 env[1212]: time="2025-05-15T10:20:12.441473007Z" level=info msg="StartContainer for \"eb7492389b70738a55ddee6c98a218e509867f13ae8ca10deadf07f854e6afb6\"" May 15 10:20:12.461998 systemd[1]: run-containerd-runc-k8s.io-eb7492389b70738a55ddee6c98a218e509867f13ae8ca10deadf07f854e6afb6-runc.gFQKZ1.mount: Deactivated successfully. May 15 10:20:12.464438 systemd[1]: Started cri-containerd-eb7492389b70738a55ddee6c98a218e509867f13ae8ca10deadf07f854e6afb6.scope. May 15 10:20:12.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:12.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:12.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:12.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:12.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:12.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:12.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:12.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:12.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:12.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:12.496000 audit: BPF prog-id=122 op=LOAD May 15 10:20:12.496000 audit[2832]: AVC avc: denied { bpf } for pid=2832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:12.496000 audit[2832]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2666 pid=2832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:12.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562373439323338396237303733386135356464656536633938613231 May 15 10:20:12.496000 audit[2832]: AVC avc: denied { perfmon } for pid=2832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:12.496000 audit[2832]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2666 pid=2832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:12.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562373439323338396237303733386135356464656536633938613231 May 15 10:20:12.496000 audit[2832]: AVC avc: denied { bpf } for pid=2832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:12.496000 audit[2832]: AVC avc: denied { bpf } for pid=2832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:12.496000 audit[2832]: AVC avc: denied { bpf } for pid=2832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:12.496000 audit[2832]: AVC avc: denied { perfmon } for pid=2832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:12.496000 audit[2832]: AVC avc: denied { perfmon } for pid=2832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:12.496000 audit[2832]: AVC avc: denied { perfmon } for pid=2832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:12.496000 audit[2832]: AVC avc: denied { perfmon } for pid=2832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:12.496000 audit[2832]: AVC avc: denied { perfmon } for pid=2832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:12.496000 audit[2832]: AVC avc: denied { bpf } for pid=2832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:12.496000 audit[2832]: AVC avc: denied { bpf } for pid=2832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:12.496000 audit: BPF prog-id=123 op=LOAD May 15 10:20:12.496000 audit[2832]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2666 pid=2832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:12.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562373439323338396237303733386135356464656536633938613231 May 15 10:20:12.496000 audit[2832]: AVC avc: denied { bpf } for pid=2832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:12.496000 audit[2832]: AVC avc: denied { bpf } for pid=2832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:12.496000 audit[2832]: AVC avc: denied { perfmon } for pid=2832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:12.496000 audit[2832]: AVC avc: denied { perfmon } for pid=2832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:12.496000 audit[2832]: AVC avc: denied { perfmon } for pid=2832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:12.496000 audit[2832]: AVC avc: denied { perfmon } for pid=2832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:12.496000 audit[2832]: AVC avc: denied { perfmon } for pid=2832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:12.496000 audit[2832]: AVC avc: denied { bpf } for pid=2832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:12.496000 audit[2832]: AVC avc: denied { bpf } for pid=2832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:12.496000 audit: BPF prog-id=124 op=LOAD May 15 10:20:12.496000 audit[2832]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2666 pid=2832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:12.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562373439323338396237303733386135356464656536633938613231 May 15 10:20:12.496000 audit: BPF prog-id=124 op=UNLOAD May 15 10:20:12.496000 audit: BPF prog-id=123 op=UNLOAD May 15 10:20:12.496000 audit[2832]: AVC avc: denied { bpf } for pid=2832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:12.496000 audit[2832]: AVC avc: denied { bpf } for pid=2832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:12.496000 audit[2832]: AVC avc: denied { bpf } for pid=2832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:12.496000 audit[2832]: AVC avc: denied { perfmon } for pid=2832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:12.496000 audit[2832]: AVC avc: denied { perfmon } for pid=2832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:12.496000 audit[2832]: AVC avc: denied { perfmon } for pid=2832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:12.496000 audit[2832]: AVC avc: denied { perfmon } for pid=2832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:12.496000 audit[2832]: AVC avc: denied { perfmon } for pid=2832 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:12.496000 audit[2832]: AVC avc: denied { bpf } for pid=2832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:12.496000 audit[2832]: AVC avc: denied { bpf } for pid=2832 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:12.496000 audit: BPF prog-id=125 op=LOAD May 15 10:20:12.496000 audit[2832]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2666 pid=2832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:12.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562373439323338396237303733386135356464656536633938613231 May 15 10:20:12.521371 env[1212]: time="2025-05-15T10:20:12.521324721Z" level=info msg="StartContainer for \"eb7492389b70738a55ddee6c98a218e509867f13ae8ca10deadf07f854e6afb6\" returns successfully" May 15 10:20:12.627902 kubelet[1450]: E0515 10:20:12.627839 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:20:12.913000 audit[2866]: NETFILTER_CFG table=filter:88 family=2 entries=8 op=nft_register_rule pid=2866 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:20:12.913000 audit[2866]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffd7768f90 a2=0 a3=1 items=0 ppid=1668 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:12.913000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:20:12.921000 audit[2866]: NETFILTER_CFG table=nat:89 family=2 entries=36 op=nft_register_rule pid=2866 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:20:12.921000 audit[2866]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=ffffd7768f90 a2=0 a3=1 items=0 ppid=1668 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:12.921000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:20:13.261000 audit[2868]: NETFILTER_CFG table=filter:90 family=2 entries=20 op=nft_register_rule pid=2868 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:20:13.261000 audit[2868]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=ffffecef9350 a2=0 a3=1 items=0 ppid=1668 pid=2868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:13.261000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:20:13.268000 audit[2868]: NETFILTER_CFG table=nat:91 family=2 entries=22 op=nft_register_rule pid=2868 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:20:13.268000 audit[2868]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffecef9350 a2=0 a3=1 items=0 ppid=1668 pid=2868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:13.268000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:20:13.297413 kubelet[1450]: I0515 10:20:13.297353 1450 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-78d645f96f-zbd97" podStartSLOduration=1.790137326 podStartE2EDuration="8.297337511s" podCreationTimestamp="2025-05-15 10:20:05 +0000 UTC" firstStartedPulling="2025-05-15 10:20:05.919926939 +0000 UTC m=+32.025429162" lastFinishedPulling="2025-05-15 10:20:12.427127124 +0000 UTC m=+38.532629347" observedRunningTime="2025-05-15 10:20:12.90446759 +0000 UTC m=+39.009969813" watchObservedRunningTime="2025-05-15 10:20:13.297337511 +0000 UTC m=+39.402839734" May 15 10:20:13.302470 systemd[1]: Created slice kubepods-besteffort-pod6ac9d0b7_edad_4e8f_bfb1_4af2fc9b67fa.slice. May 15 10:20:13.350207 kubelet[1450]: I0515 10:20:13.350136 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6sst5\" (UniqueName: \"kubernetes.io/projected/6ac9d0b7-edad-4e8f-bfb1-4af2fc9b67fa-kube-api-access-6sst5\") pod \"nfs-server-provisioner-0\" (UID: \"6ac9d0b7-edad-4e8f-bfb1-4af2fc9b67fa\") " pod="default/nfs-server-provisioner-0" May 15 10:20:13.350207 kubelet[1450]: I0515 10:20:13.350180 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/6ac9d0b7-edad-4e8f-bfb1-4af2fc9b67fa-data\") pod \"nfs-server-provisioner-0\" (UID: \"6ac9d0b7-edad-4e8f-bfb1-4af2fc9b67fa\") " pod="default/nfs-server-provisioner-0" May 15 10:20:13.588000 audit[2843]: AVC avc: denied { watch } for pid=2843 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_10_20_05.1085457439/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c514,c858 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c514,c858 tclass=file permissive=0 May 15 10:20:13.588000 audit[2843]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000c94280 a2=fc6 a3=0 items=0 ppid=2666 pid=2843 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c514,c858 key=(null) May 15 10:20:13.588000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 10:20:13.605582 env[1212]: time="2025-05-15T10:20:13.605530625Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:6ac9d0b7-edad-4e8f-bfb1-4af2fc9b67fa,Namespace:default,Attempt:0,}" May 15 10:20:13.628478 kubelet[1450]: E0515 10:20:13.628423 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:20:13.717646 systemd-networkd[1041]: cali60e51b789ff: Link UP May 15 10:20:13.719488 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 10:20:13.719620 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready May 15 10:20:13.719747 systemd-networkd[1041]: cali60e51b789ff: Gained carrier May 15 10:20:13.735825 env[1212]: 2025-05-15 10:20:13.654 [INFO][2871] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.90-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 6ac9d0b7-edad-4e8f-bfb1-4af2fc9b67fa 1213 0 2025-05-15 10:20:13 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.0.0.90 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="be1355b5877fec0e374711fd9c607808476275fadf7a8dd232c3f3a1b447a2bb" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.90-k8s-nfs--server--provisioner--0-" May 15 10:20:13.735825 env[1212]: 2025-05-15 10:20:13.654 [INFO][2871] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="be1355b5877fec0e374711fd9c607808476275fadf7a8dd232c3f3a1b447a2bb" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.90-k8s-nfs--server--provisioner--0-eth0" May 15 10:20:13.735825 env[1212]: 2025-05-15 10:20:13.678 [INFO][2883] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="be1355b5877fec0e374711fd9c607808476275fadf7a8dd232c3f3a1b447a2bb" HandleID="k8s-pod-network.be1355b5877fec0e374711fd9c607808476275fadf7a8dd232c3f3a1b447a2bb" Workload="10.0.0.90-k8s-nfs--server--provisioner--0-eth0" May 15 10:20:13.735825 env[1212]: 2025-05-15 10:20:13.689 [INFO][2883] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="be1355b5877fec0e374711fd9c607808476275fadf7a8dd232c3f3a1b447a2bb" HandleID="k8s-pod-network.be1355b5877fec0e374711fd9c607808476275fadf7a8dd232c3f3a1b447a2bb" Workload="10.0.0.90-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400053de70), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.90", "pod":"nfs-server-provisioner-0", "timestamp":"2025-05-15 10:20:13.678566553 +0000 UTC"}, Hostname:"10.0.0.90", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:20:13.735825 env[1212]: 2025-05-15 10:20:13.689 [INFO][2883] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:20:13.735825 env[1212]: 2025-05-15 10:20:13.689 [INFO][2883] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:20:13.735825 env[1212]: 2025-05-15 10:20:13.689 [INFO][2883] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.90' May 15 10:20:13.735825 env[1212]: 2025-05-15 10:20:13.691 [INFO][2883] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.be1355b5877fec0e374711fd9c607808476275fadf7a8dd232c3f3a1b447a2bb" host="10.0.0.90" May 15 10:20:13.735825 env[1212]: 2025-05-15 10:20:13.695 [INFO][2883] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.90" May 15 10:20:13.735825 env[1212]: 2025-05-15 10:20:13.699 [INFO][2883] ipam/ipam.go 489: Trying affinity for 192.168.37.64/26 host="10.0.0.90" May 15 10:20:13.735825 env[1212]: 2025-05-15 10:20:13.701 [INFO][2883] ipam/ipam.go 155: Attempting to load block cidr=192.168.37.64/26 host="10.0.0.90" May 15 10:20:13.735825 env[1212]: 2025-05-15 10:20:13.703 [INFO][2883] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.37.64/26 host="10.0.0.90" May 15 10:20:13.735825 env[1212]: 2025-05-15 10:20:13.703 [INFO][2883] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.37.64/26 handle="k8s-pod-network.be1355b5877fec0e374711fd9c607808476275fadf7a8dd232c3f3a1b447a2bb" host="10.0.0.90" May 15 10:20:13.735825 env[1212]: 2025-05-15 10:20:13.704 [INFO][2883] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.be1355b5877fec0e374711fd9c607808476275fadf7a8dd232c3f3a1b447a2bb May 15 10:20:13.735825 env[1212]: 2025-05-15 10:20:13.708 [INFO][2883] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.37.64/26 handle="k8s-pod-network.be1355b5877fec0e374711fd9c607808476275fadf7a8dd232c3f3a1b447a2bb" host="10.0.0.90" May 15 10:20:13.735825 env[1212]: 2025-05-15 10:20:13.713 [INFO][2883] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.37.68/26] block=192.168.37.64/26 handle="k8s-pod-network.be1355b5877fec0e374711fd9c607808476275fadf7a8dd232c3f3a1b447a2bb" host="10.0.0.90" May 15 10:20:13.735825 env[1212]: 2025-05-15 10:20:13.713 [INFO][2883] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.37.68/26] handle="k8s-pod-network.be1355b5877fec0e374711fd9c607808476275fadf7a8dd232c3f3a1b447a2bb" host="10.0.0.90" May 15 10:20:13.735825 env[1212]: 2025-05-15 10:20:13.713 [INFO][2883] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:20:13.735825 env[1212]: 2025-05-15 10:20:13.713 [INFO][2883] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.37.68/26] IPv6=[] ContainerID="be1355b5877fec0e374711fd9c607808476275fadf7a8dd232c3f3a1b447a2bb" HandleID="k8s-pod-network.be1355b5877fec0e374711fd9c607808476275fadf7a8dd232c3f3a1b447a2bb" Workload="10.0.0.90-k8s-nfs--server--provisioner--0-eth0" May 15 10:20:13.736410 env[1212]: 2025-05-15 10:20:13.715 [INFO][2871] cni-plugin/k8s.go 386: Populated endpoint ContainerID="be1355b5877fec0e374711fd9c607808476275fadf7a8dd232c3f3a1b447a2bb" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.90-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.90-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"6ac9d0b7-edad-4e8f-bfb1-4af2fc9b67fa", ResourceVersion:"1213", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 20, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.90", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.37.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:20:13.736410 env[1212]: 2025-05-15 10:20:13.715 [INFO][2871] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.37.68/32] ContainerID="be1355b5877fec0e374711fd9c607808476275fadf7a8dd232c3f3a1b447a2bb" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.90-k8s-nfs--server--provisioner--0-eth0" May 15 10:20:13.736410 env[1212]: 2025-05-15 10:20:13.715 [INFO][2871] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="be1355b5877fec0e374711fd9c607808476275fadf7a8dd232c3f3a1b447a2bb" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.90-k8s-nfs--server--provisioner--0-eth0" May 15 10:20:13.736410 env[1212]: 2025-05-15 10:20:13.719 [INFO][2871] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="be1355b5877fec0e374711fd9c607808476275fadf7a8dd232c3f3a1b447a2bb" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.90-k8s-nfs--server--provisioner--0-eth0" May 15 10:20:13.736651 env[1212]: 2025-05-15 10:20:13.720 [INFO][2871] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="be1355b5877fec0e374711fd9c607808476275fadf7a8dd232c3f3a1b447a2bb" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.90-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.90-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"6ac9d0b7-edad-4e8f-bfb1-4af2fc9b67fa", ResourceVersion:"1213", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 20, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.90", ContainerID:"be1355b5877fec0e374711fd9c607808476275fadf7a8dd232c3f3a1b447a2bb", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.37.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"02:fe:1f:a7:a9:fa", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:20:13.736651 env[1212]: 2025-05-15 10:20:13.734 [INFO][2871] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="be1355b5877fec0e374711fd9c607808476275fadf7a8dd232c3f3a1b447a2bb" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.90-k8s-nfs--server--provisioner--0-eth0" May 15 10:20:13.743000 audit[2907]: NETFILTER_CFG table=filter:92 family=2 entries=42 op=nft_register_chain pid=2907 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:20:13.743000 audit[2907]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21008 a0=3 a1=fffffd117e10 a2=0 a3=ffff9c7f1fa8 items=0 ppid=2127 pid=2907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:13.743000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:20:13.746505 env[1212]: time="2025-05-15T10:20:13.746439543Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:20:13.746657 env[1212]: time="2025-05-15T10:20:13.746480417Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:20:13.746756 env[1212]: time="2025-05-15T10:20:13.746641351Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:20:13.747005 env[1212]: time="2025-05-15T10:20:13.746971538Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/be1355b5877fec0e374711fd9c607808476275fadf7a8dd232c3f3a1b447a2bb pid=2914 runtime=io.containerd.runc.v2 May 15 10:20:13.760521 systemd[1]: Started cri-containerd-be1355b5877fec0e374711fd9c607808476275fadf7a8dd232c3f3a1b447a2bb.scope. May 15 10:20:13.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:13.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:13.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:13.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:13.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:13.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:13.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:13.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:13.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:13.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:13.793000 audit: BPF prog-id=126 op=LOAD May 15 10:20:13.794000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:13.794000 audit[2923]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2914 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:13.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265313335356235383737666563306533373437313166643963363037 May 15 10:20:13.794000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:13.794000 audit[2923]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2914 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:13.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265313335356235383737666563306533373437313166643963363037 May 15 10:20:13.794000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:13.794000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:13.794000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:13.794000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:13.794000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:13.794000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:13.794000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:13.794000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:13.794000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:13.794000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:13.794000 audit: BPF prog-id=127 op=LOAD May 15 10:20:13.794000 audit[2923]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2914 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:13.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265313335356235383737666563306533373437313166643963363037 May 15 10:20:13.794000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:13.794000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:13.794000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:13.794000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:13.794000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:13.794000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:13.794000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:13.794000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:13.794000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:13.794000 audit: BPF prog-id=128 op=LOAD May 15 10:20:13.794000 audit[2923]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2914 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:13.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265313335356235383737666563306533373437313166643963363037 May 15 10:20:13.794000 audit: BPF prog-id=128 op=UNLOAD May 15 10:20:13.794000 audit: BPF prog-id=127 op=UNLOAD May 15 10:20:13.794000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:13.794000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:13.794000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:13.794000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:13.794000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:13.794000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:13.794000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:13.794000 audit[2923]: AVC avc: denied { perfmon } for pid=2923 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:13.794000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:13.794000 audit[2923]: AVC avc: denied { bpf } for pid=2923 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:13.794000 audit: BPF prog-id=129 op=LOAD May 15 10:20:13.794000 audit[2923]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2914 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:13.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265313335356235383737666563306533373437313166643963363037 May 15 10:20:13.797502 systemd-resolved[1155]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:20:13.812669 env[1212]: time="2025-05-15T10:20:13.812620843Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:6ac9d0b7-edad-4e8f-bfb1-4af2fc9b67fa,Namespace:default,Attempt:0,} returns sandbox id \"be1355b5877fec0e374711fd9c607808476275fadf7a8dd232c3f3a1b447a2bb\"" May 15 10:20:13.814727 env[1212]: time="2025-05-15T10:20:13.814697472Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" May 15 10:20:13.898170 kubelet[1450]: I0515 10:20:13.898075 1450 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 15 10:20:14.281000 audit[2948]: NETFILTER_CFG table=filter:93 family=2 entries=32 op=nft_register_rule pid=2948 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:20:14.281000 audit[2948]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=ffffc325d330 a2=0 a3=1 items=0 ppid=1668 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:14.281000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:20:14.290000 audit[2948]: NETFILTER_CFG table=nat:94 family=2 entries=22 op=nft_register_rule pid=2948 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:20:14.290000 audit[2948]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffc325d330 a2=0 a3=1 items=0 ppid=1668 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:14.290000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:20:14.602699 kubelet[1450]: E0515 10:20:14.602348 1450 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:20:14.629365 kubelet[1450]: E0515 10:20:14.629252 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:20:15.507340 systemd-networkd[1041]: cali60e51b789ff: Gained IPv6LL May 15 10:20:15.629802 kubelet[1450]: E0515 10:20:15.629759 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:20:15.793675 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3870604703.mount: Deactivated successfully. May 15 10:20:16.630389 kubelet[1450]: E0515 10:20:16.630342 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:20:17.486989 env[1212]: time="2025-05-15T10:20:17.486945207Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:20:17.488463 env[1212]: time="2025-05-15T10:20:17.488426745Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:20:17.489885 env[1212]: time="2025-05-15T10:20:17.489850250Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:20:17.491634 env[1212]: time="2025-05-15T10:20:17.491599034Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:20:17.493089 env[1212]: time="2025-05-15T10:20:17.493052816Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685\"" May 15 10:20:17.494940 env[1212]: time="2025-05-15T10:20:17.494914187Z" level=info msg="CreateContainer within sandbox \"be1355b5877fec0e374711fd9c607808476275fadf7a8dd232c3f3a1b447a2bb\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" May 15 10:20:17.505250 env[1212]: time="2025-05-15T10:20:17.505217999Z" level=info msg="CreateContainer within sandbox \"be1355b5877fec0e374711fd9c607808476275fadf7a8dd232c3f3a1b447a2bb\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"21056562a1f2e45487f3eef6ba36054a20a0cac71fdefecc015281308facf644\"" May 15 10:20:17.505794 env[1212]: time="2025-05-15T10:20:17.505766731Z" level=info msg="StartContainer for \"21056562a1f2e45487f3eef6ba36054a20a0cac71fdefecc015281308facf644\"" May 15 10:20:17.518348 systemd[1]: Started cri-containerd-21056562a1f2e45487f3eef6ba36054a20a0cac71fdefecc015281308facf644.scope. May 15 10:20:17.544077 kernel: kauditd_printk_skb: 171 callbacks suppressed May 15 10:20:17.544180 kernel: audit: type=1400 audit(1747304417.541:787): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:17.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:17.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:17.548571 kernel: audit: type=1400 audit(1747304417.541:788): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:17.548621 kernel: audit: type=1400 audit(1747304417.541:789): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:17.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:17.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:17.553311 kernel: audit: type=1400 audit(1747304417.541:790): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:17.553404 kernel: audit: type=1400 audit(1747304417.541:791): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:17.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:17.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:17.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:17.561738 kernel: audit: type=1400 audit(1747304417.541:792): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:17.561865 kernel: audit: type=1400 audit(1747304417.541:793): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:17.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:17.564301 kernel: audit: type=1400 audit(1747304417.541:794): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:17.564367 kernel: audit: type=1400 audit(1747304417.541:795): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:17.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:17.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:17.569046 kernel: audit: type=1400 audit(1747304417.543:796): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:17.543000 audit: BPF prog-id=130 op=LOAD May 15 10:20:17.543000 audit[2956]: AVC avc: denied { bpf } for pid=2956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:17.543000 audit[2956]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2914 pid=2956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:17.543000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231303536353632613166326534353438376633656566366261333630 May 15 10:20:17.543000 audit[2956]: AVC avc: denied { perfmon } for pid=2956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:17.543000 audit[2956]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2914 pid=2956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:17.543000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231303536353632613166326534353438376633656566366261333630 May 15 10:20:17.543000 audit[2956]: AVC avc: denied { bpf } for pid=2956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:17.543000 audit[2956]: AVC avc: denied { bpf } for pid=2956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:17.543000 audit[2956]: AVC avc: denied { bpf } for pid=2956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:17.543000 audit[2956]: AVC avc: denied { perfmon } for pid=2956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:17.543000 audit[2956]: AVC avc: denied { perfmon } for pid=2956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:17.543000 audit[2956]: AVC avc: denied { perfmon } for pid=2956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:17.543000 audit[2956]: AVC avc: denied { perfmon } for pid=2956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:17.543000 audit[2956]: AVC avc: denied { perfmon } for pid=2956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:17.543000 audit[2956]: AVC avc: denied { bpf } for pid=2956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:17.543000 audit[2956]: AVC avc: denied { bpf } for pid=2956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:17.543000 audit: BPF prog-id=131 op=LOAD May 15 10:20:17.543000 audit[2956]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2914 pid=2956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:17.543000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231303536353632613166326534353438376633656566366261333630 May 15 10:20:17.545000 audit[2956]: AVC avc: denied { bpf } for pid=2956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:17.545000 audit[2956]: AVC avc: denied { bpf } for pid=2956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:17.545000 audit[2956]: AVC avc: denied { perfmon } for pid=2956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:17.545000 audit[2956]: AVC avc: denied { perfmon } for pid=2956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:17.545000 audit[2956]: AVC avc: denied { perfmon } for pid=2956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:17.545000 audit[2956]: AVC avc: denied { perfmon } for pid=2956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:17.545000 audit[2956]: AVC avc: denied { perfmon } for pid=2956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:17.545000 audit[2956]: AVC avc: denied { bpf } for pid=2956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:17.545000 audit[2956]: AVC avc: denied { bpf } for pid=2956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:17.545000 audit: BPF prog-id=132 op=LOAD May 15 10:20:17.545000 audit[2956]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2914 pid=2956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:17.545000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231303536353632613166326534353438376633656566366261333630 May 15 10:20:17.548000 audit: BPF prog-id=132 op=UNLOAD May 15 10:20:17.548000 audit: BPF prog-id=131 op=UNLOAD May 15 10:20:17.548000 audit[2956]: AVC avc: denied { bpf } for pid=2956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:17.548000 audit[2956]: AVC avc: denied { bpf } for pid=2956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:17.548000 audit[2956]: AVC avc: denied { bpf } for pid=2956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:17.548000 audit[2956]: AVC avc: denied { perfmon } for pid=2956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:17.548000 audit[2956]: AVC avc: denied { perfmon } for pid=2956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:17.548000 audit[2956]: AVC avc: denied { perfmon } for pid=2956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:17.548000 audit[2956]: AVC avc: denied { perfmon } for pid=2956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:17.548000 audit[2956]: AVC avc: denied { perfmon } for pid=2956 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:17.548000 audit[2956]: AVC avc: denied { bpf } for pid=2956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:17.548000 audit[2956]: AVC avc: denied { bpf } for pid=2956 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:17.548000 audit: BPF prog-id=133 op=LOAD May 15 10:20:17.548000 audit[2956]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2914 pid=2956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:17.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231303536353632613166326534353438376633656566366261333630 May 15 10:20:17.572994 env[1212]: time="2025-05-15T10:20:17.572943547Z" level=info msg="StartContainer for \"21056562a1f2e45487f3eef6ba36054a20a0cac71fdefecc015281308facf644\" returns successfully" May 15 10:20:17.631489 kubelet[1450]: E0515 10:20:17.631439 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:20:17.677000 audit[2984]: AVC avc: denied { search } for pid=2984 comm="rpcbind" name="crypto" dev="proc" ino=20548 scontext=system_u:system_r:svirt_lxc_net_t:s0:c264,c933 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 15 10:20:17.677000 audit[2984]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff81c4f000 a2=0 a3=0 items=0 ppid=2967 pid=2984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c264,c933 key=(null) May 15 10:20:17.677000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 May 15 10:20:17.717000 audit[2989]: AVC avc: denied { search } for pid=2989 comm="dbus-daemon" name="crypto" dev="proc" ino=20548 scontext=system_u:system_r:svirt_lxc_net_t:s0:c264,c933 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 15 10:20:17.717000 audit[2989]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff8884f000 a2=0 a3=0 items=0 ppid=2967 pid=2989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c264,c933 key=(null) May 15 10:20:17.717000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 15 10:20:17.724000 audit[2990]: AVC avc: denied { watch } for pid=2990 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c264,c933 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c264,c933 tclass=dir permissive=0 May 15 10:20:17.724000 audit[2990]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=aaaac7f87080 a2=2c8 a3=aaaac7f72a60 items=0 ppid=2967 pid=2990 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c264,c933 key=(null) May 15 10:20:17.724000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 15 10:20:17.728000 audit[2991]: AVC avc: denied { read } for pid=2991 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=20570 scontext=system_u:system_r:svirt_lxc_net_t:s0:c264,c933 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 May 15 10:20:17.728000 audit[2991]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffff9c a1=ffff98b4a570 a2=80000 a3=0 items=0 ppid=2967 pid=2991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c264,c933 key=(null) May 15 10:20:17.728000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 15 10:20:17.728000 audit[2991]: AVC avc: denied { search } for pid=2991 comm="ganesha.nfsd" name="crypto" dev="proc" ino=20548 scontext=system_u:system_r:svirt_lxc_net_t:s0:c264,c933 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 15 10:20:17.728000 audit[2991]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff97edf000 a2=0 a3=0 items=0 ppid=2967 pid=2991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c264,c933 key=(null) May 15 10:20:17.728000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 15 10:20:17.917239 kubelet[1450]: I0515 10:20:17.916991 1450 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.237635933 podStartE2EDuration="4.916975582s" podCreationTimestamp="2025-05-15 10:20:13 +0000 UTC" firstStartedPulling="2025-05-15 10:20:13.814317892 +0000 UTC m=+39.919820075" lastFinishedPulling="2025-05-15 10:20:17.493657501 +0000 UTC m=+43.599159724" observedRunningTime="2025-05-15 10:20:17.916156723 +0000 UTC m=+44.021658946" watchObservedRunningTime="2025-05-15 10:20:17.916975582 +0000 UTC m=+44.022477805" May 15 10:20:17.926000 audit[3011]: NETFILTER_CFG table=filter:95 family=2 entries=20 op=nft_register_rule pid=3011 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:20:17.926000 audit[3011]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffc396b470 a2=0 a3=1 items=0 ppid=1668 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:17.926000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:20:17.936000 audit[3011]: NETFILTER_CFG table=nat:96 family=2 entries=106 op=nft_register_chain pid=3011 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:20:17.936000 audit[3011]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffc396b470 a2=0 a3=1 items=0 ppid=1668 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:17.936000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:20:18.632248 kubelet[1450]: E0515 10:20:18.632208 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:20:19.633666 kubelet[1450]: E0515 10:20:19.633615 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:20:20.634356 kubelet[1450]: E0515 10:20:20.634314 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:20:20.954104 kubelet[1450]: E0515 10:20:20.953993 1450 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:20:21.635178 kubelet[1450]: E0515 10:20:21.635137 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:20:21.690965 systemd[1]: Created slice kubepods-besteffort-pode5f7ff8c_ddeb_4861_96c0_770e24634054.slice. May 15 10:20:21.699233 kubelet[1450]: I0515 10:20:21.699173 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/e5f7ff8c-ddeb-4861-96c0-770e24634054-typha-certs\") pod \"calico-typha-7ddcb749d4-gmc4n\" (UID: \"e5f7ff8c-ddeb-4861-96c0-770e24634054\") " pod="calico-system/calico-typha-7ddcb749d4-gmc4n" May 15 10:20:21.699233 kubelet[1450]: I0515 10:20:21.699235 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mfn45\" (UniqueName: \"kubernetes.io/projected/e5f7ff8c-ddeb-4861-96c0-770e24634054-kube-api-access-mfn45\") pod \"calico-typha-7ddcb749d4-gmc4n\" (UID: \"e5f7ff8c-ddeb-4861-96c0-770e24634054\") " pod="calico-system/calico-typha-7ddcb749d4-gmc4n" May 15 10:20:21.699414 kubelet[1450]: I0515 10:20:21.699262 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/e5f7ff8c-ddeb-4861-96c0-770e24634054-tigera-ca-bundle\") pod \"calico-typha-7ddcb749d4-gmc4n\" (UID: \"e5f7ff8c-ddeb-4861-96c0-770e24634054\") " pod="calico-system/calico-typha-7ddcb749d4-gmc4n" May 15 10:20:21.714000 audit[3038]: NETFILTER_CFG table=filter:97 family=2 entries=8 op=nft_register_rule pid=3038 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:20:21.714000 audit[3038]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffe3d28550 a2=0 a3=1 items=0 ppid=1668 pid=3038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:21.714000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:20:21.723000 audit[3038]: NETFILTER_CFG table=nat:98 family=2 entries=54 op=nft_register_rule pid=3038 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:20:21.723000 audit[3038]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18564 a0=3 a1=ffffe3d28550 a2=0 a3=1 items=0 ppid=1668 pid=3038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:21.723000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:20:21.744000 audit[3042]: NETFILTER_CFG table=filter:99 family=2 entries=8 op=nft_register_rule pid=3042 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:20:21.744000 audit[3042]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffcf8d7860 a2=0 a3=1 items=0 ppid=1668 pid=3042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:21.744000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:20:21.751000 audit[3042]: NETFILTER_CFG table=nat:100 family=2 entries=54 op=nft_register_rule pid=3042 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:20:21.751000 audit[3042]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18564 a0=3 a1=ffffcf8d7860 a2=0 a3=1 items=0 ppid=1668 pid=3042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:21.751000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:20:21.993598 kubelet[1450]: E0515 10:20:21.993562 1450 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:20:21.994094 env[1212]: time="2025-05-15T10:20:21.994055473Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7ddcb749d4-gmc4n,Uid:e5f7ff8c-ddeb-4861-96c0-770e24634054,Namespace:calico-system,Attempt:0,}" May 15 10:20:22.019209 env[1212]: time="2025-05-15T10:20:22.019160994Z" level=info msg="StopContainer for \"c3e24861ca0a3368eeb893100fc72fa62d309afcb6a27ba9599b6e6abdcf66db\" with timeout 5 (s)" May 15 10:20:22.019654 env[1212]: time="2025-05-15T10:20:22.019627912Z" level=info msg="Stop container \"c3e24861ca0a3368eeb893100fc72fa62d309afcb6a27ba9599b6e6abdcf66db\" with signal terminated" May 15 10:20:22.033837 systemd[1]: cri-containerd-c3e24861ca0a3368eeb893100fc72fa62d309afcb6a27ba9599b6e6abdcf66db.scope: Deactivated successfully. May 15 10:20:22.034145 systemd[1]: cri-containerd-c3e24861ca0a3368eeb893100fc72fa62d309afcb6a27ba9599b6e6abdcf66db.scope: Consumed 1.557s CPU time. May 15 10:20:22.053463 env[1212]: time="2025-05-15T10:20:22.049811823Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:20:22.053463 env[1212]: time="2025-05-15T10:20:22.049901175Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:20:22.053463 env[1212]: time="2025-05-15T10:20:22.049929053Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:20:22.053463 env[1212]: time="2025-05-15T10:20:22.050073800Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/888314438c5359b9b8a14a23861b90cc3bdc3ec5f0b4965c2ad7ec16a76a6b31 pid=3082 runtime=io.containerd.runc.v2 May 15 10:20:22.066891 systemd[1]: run-containerd-runc-k8s.io-888314438c5359b9b8a14a23861b90cc3bdc3ec5f0b4965c2ad7ec16a76a6b31-runc.uVHuO8.mount: Deactivated successfully. May 15 10:20:22.069225 systemd[1]: Started cri-containerd-888314438c5359b9b8a14a23861b90cc3bdc3ec5f0b4965c2ad7ec16a76a6b31.scope. May 15 10:20:22.084224 env[1212]: time="2025-05-15T10:20:22.077267537Z" level=info msg="shim disconnected" id=c3e24861ca0a3368eeb893100fc72fa62d309afcb6a27ba9599b6e6abdcf66db May 15 10:20:22.084224 env[1212]: time="2025-05-15T10:20:22.077317692Z" level=warning msg="cleaning up after shim disconnected" id=c3e24861ca0a3368eeb893100fc72fa62d309afcb6a27ba9599b6e6abdcf66db namespace=k8s.io May 15 10:20:22.084224 env[1212]: time="2025-05-15T10:20:22.077326612Z" level=info msg="cleaning up dead shim" May 15 10:20:22.084224 env[1212]: time="2025-05-15T10:20:22.083562016Z" level=warning msg="cleanup warnings time=\"2025-05-15T10:20:22Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3113 runtime=io.containerd.runc.v2\n" May 15 10:20:22.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.121000 audit: BPF prog-id=134 op=LOAD May 15 10:20:22.121000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.121000 audit[3090]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000149b38 a2=10 a3=0 items=0 ppid=3082 pid=3090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:22.121000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838383331343433386335333539623962386131346132333836316239 May 15 10:20:22.121000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.121000 audit[3090]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001495a0 a2=3c a3=0 items=0 ppid=3082 pid=3090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:22.121000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838383331343433386335333539623962386131346132333836316239 May 15 10:20:22.121000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.121000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.121000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.121000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.121000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.121000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.121000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.121000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.121000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.121000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.121000 audit: BPF prog-id=135 op=LOAD May 15 10:20:22.121000 audit[3090]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001498e0 a2=78 a3=0 items=0 ppid=3082 pid=3090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:22.121000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838383331343433386335333539623962386131346132333836316239 May 15 10:20:22.121000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.121000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.121000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.121000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.121000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.121000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.121000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.121000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.121000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.121000 audit: BPF prog-id=136 op=LOAD May 15 10:20:22.121000 audit[3090]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000149670 a2=78 a3=0 items=0 ppid=3082 pid=3090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:22.121000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838383331343433386335333539623962386131346132333836316239 May 15 10:20:22.121000 audit: BPF prog-id=136 op=UNLOAD May 15 10:20:22.121000 audit: BPF prog-id=135 op=UNLOAD May 15 10:20:22.121000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.121000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.121000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.121000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.121000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.121000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.121000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.121000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.121000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.121000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.121000 audit: BPF prog-id=137 op=LOAD May 15 10:20:22.121000 audit[3090]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000149b40 a2=78 a3=0 items=0 ppid=3082 pid=3090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:22.121000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838383331343433386335333539623962386131346132333836316239 May 15 10:20:22.146152 env[1212]: time="2025-05-15T10:20:22.146097245Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7ddcb749d4-gmc4n,Uid:e5f7ff8c-ddeb-4861-96c0-770e24634054,Namespace:calico-system,Attempt:0,} returns sandbox id \"888314438c5359b9b8a14a23861b90cc3bdc3ec5f0b4965c2ad7ec16a76a6b31\"" May 15 10:20:22.147029 kubelet[1450]: E0515 10:20:22.146995 1450 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:20:22.148139 env[1212]: time="2025-05-15T10:20:22.148107146Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\"" May 15 10:20:22.245293 env[1212]: time="2025-05-15T10:20:22.245170018Z" level=info msg="StopContainer for \"c3e24861ca0a3368eeb893100fc72fa62d309afcb6a27ba9599b6e6abdcf66db\" returns successfully" May 15 10:20:22.246744 env[1212]: time="2025-05-15T10:20:22.246708521Z" level=info msg="StopPodSandbox for \"389ffa7fe80f06e188c15a4ae7b3c533a98302f393d377d965e26d6514fcac24\"" May 15 10:20:22.246903 env[1212]: time="2025-05-15T10:20:22.246881306Z" level=info msg="Container to stop \"ba92bd157df37523feb79f972ee67da67d611344547bd6c9f4f3d9b2173bfb2d\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 15 10:20:22.246976 env[1212]: time="2025-05-15T10:20:22.246960459Z" level=info msg="Container to stop \"afcab0498870f58d90bb510f537b78fb2a906ddc0c87150fc024119d8e9b244b\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 15 10:20:22.247038 env[1212]: time="2025-05-15T10:20:22.247020853Z" level=info msg="Container to stop \"c3e24861ca0a3368eeb893100fc72fa62d309afcb6a27ba9599b6e6abdcf66db\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 15 10:20:22.250000 audit: BPF prog-id=61 op=UNLOAD May 15 10:20:22.251832 systemd[1]: cri-containerd-389ffa7fe80f06e188c15a4ae7b3c533a98302f393d377d965e26d6514fcac24.scope: Deactivated successfully. May 15 10:20:22.255000 audit: BPF prog-id=64 op=UNLOAD May 15 10:20:22.272583 env[1212]: time="2025-05-15T10:20:22.272530860Z" level=info msg="shim disconnected" id=389ffa7fe80f06e188c15a4ae7b3c533a98302f393d377d965e26d6514fcac24 May 15 10:20:22.272583 env[1212]: time="2025-05-15T10:20:22.272576656Z" level=warning msg="cleaning up after shim disconnected" id=389ffa7fe80f06e188c15a4ae7b3c533a98302f393d377d965e26d6514fcac24 namespace=k8s.io May 15 10:20:22.272583 env[1212]: time="2025-05-15T10:20:22.272586336Z" level=info msg="cleaning up dead shim" May 15 10:20:22.280400 env[1212]: time="2025-05-15T10:20:22.280350164Z" level=warning msg="cleanup warnings time=\"2025-05-15T10:20:22Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3159 runtime=io.containerd.runc.v2\n" May 15 10:20:22.285255 env[1212]: time="2025-05-15T10:20:22.285184533Z" level=info msg="TearDown network for sandbox \"389ffa7fe80f06e188c15a4ae7b3c533a98302f393d377d965e26d6514fcac24\" successfully" May 15 10:20:22.285255 env[1212]: time="2025-05-15T10:20:22.285249567Z" level=info msg="StopPodSandbox for \"389ffa7fe80f06e188c15a4ae7b3c533a98302f393d377d965e26d6514fcac24\" returns successfully" May 15 10:20:22.302692 kubelet[1450]: I0515 10:20:22.302640 1450 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/cbad5039-6a5e-4953-a8af-0271b172027b-tigera-ca-bundle\") pod \"cbad5039-6a5e-4953-a8af-0271b172027b\" (UID: \"cbad5039-6a5e-4953-a8af-0271b172027b\") " May 15 10:20:22.302692 kubelet[1450]: I0515 10:20:22.302682 1450 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/cbad5039-6a5e-4953-a8af-0271b172027b-cni-log-dir\") pod \"cbad5039-6a5e-4953-a8af-0271b172027b\" (UID: \"cbad5039-6a5e-4953-a8af-0271b172027b\") " May 15 10:20:22.302692 kubelet[1450]: I0515 10:20:22.302703 1450 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-ghdcv\" (UniqueName: \"kubernetes.io/projected/cbad5039-6a5e-4953-a8af-0271b172027b-kube-api-access-ghdcv\") pod \"cbad5039-6a5e-4953-a8af-0271b172027b\" (UID: \"cbad5039-6a5e-4953-a8af-0271b172027b\") " May 15 10:20:22.302902 kubelet[1450]: I0515 10:20:22.302721 1450 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/cbad5039-6a5e-4953-a8af-0271b172027b-policysync\") pod \"cbad5039-6a5e-4953-a8af-0271b172027b\" (UID: \"cbad5039-6a5e-4953-a8af-0271b172027b\") " May 15 10:20:22.302902 kubelet[1450]: I0515 10:20:22.302737 1450 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/cbad5039-6a5e-4953-a8af-0271b172027b-var-run-calico\") pod \"cbad5039-6a5e-4953-a8af-0271b172027b\" (UID: \"cbad5039-6a5e-4953-a8af-0271b172027b\") " May 15 10:20:22.302902 kubelet[1450]: I0515 10:20:22.302755 1450 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/cbad5039-6a5e-4953-a8af-0271b172027b-node-certs\") pod \"cbad5039-6a5e-4953-a8af-0271b172027b\" (UID: \"cbad5039-6a5e-4953-a8af-0271b172027b\") " May 15 10:20:22.302902 kubelet[1450]: I0515 10:20:22.302772 1450 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/cbad5039-6a5e-4953-a8af-0271b172027b-cni-net-dir\") pod \"cbad5039-6a5e-4953-a8af-0271b172027b\" (UID: \"cbad5039-6a5e-4953-a8af-0271b172027b\") " May 15 10:20:22.302902 kubelet[1450]: I0515 10:20:22.302775 1450 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/cbad5039-6a5e-4953-a8af-0271b172027b-cni-log-dir" (OuterVolumeSpecName: "cni-log-dir") pod "cbad5039-6a5e-4953-a8af-0271b172027b" (UID: "cbad5039-6a5e-4953-a8af-0271b172027b"). InnerVolumeSpecName "cni-log-dir". PluginName "kubernetes.io/host-path", VolumeGIDValue "" May 15 10:20:22.302902 kubelet[1450]: I0515 10:20:22.302789 1450 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/cbad5039-6a5e-4953-a8af-0271b172027b-cni-bin-dir\") pod \"cbad5039-6a5e-4953-a8af-0271b172027b\" (UID: \"cbad5039-6a5e-4953-a8af-0271b172027b\") " May 15 10:20:22.303050 kubelet[1450]: I0515 10:20:22.302820 1450 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/cbad5039-6a5e-4953-a8af-0271b172027b-cni-bin-dir" (OuterVolumeSpecName: "cni-bin-dir") pod "cbad5039-6a5e-4953-a8af-0271b172027b" (UID: "cbad5039-6a5e-4953-a8af-0271b172027b"). InnerVolumeSpecName "cni-bin-dir". PluginName "kubernetes.io/host-path", VolumeGIDValue "" May 15 10:20:22.303050 kubelet[1450]: I0515 10:20:22.302841 1450 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/cbad5039-6a5e-4953-a8af-0271b172027b-xtables-lock\") pod \"cbad5039-6a5e-4953-a8af-0271b172027b\" (UID: \"cbad5039-6a5e-4953-a8af-0271b172027b\") " May 15 10:20:22.303050 kubelet[1450]: I0515 10:20:22.302862 1450 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/cbad5039-6a5e-4953-a8af-0271b172027b-var-lib-calico\") pod \"cbad5039-6a5e-4953-a8af-0271b172027b\" (UID: \"cbad5039-6a5e-4953-a8af-0271b172027b\") " May 15 10:20:22.303050 kubelet[1450]: I0515 10:20:22.302881 1450 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/cbad5039-6a5e-4953-a8af-0271b172027b-lib-modules\") pod \"cbad5039-6a5e-4953-a8af-0271b172027b\" (UID: \"cbad5039-6a5e-4953-a8af-0271b172027b\") " May 15 10:20:22.303050 kubelet[1450]: I0515 10:20:22.302897 1450 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/cbad5039-6a5e-4953-a8af-0271b172027b-flexvol-driver-host\") pod \"cbad5039-6a5e-4953-a8af-0271b172027b\" (UID: \"cbad5039-6a5e-4953-a8af-0271b172027b\") " May 15 10:20:22.303050 kubelet[1450]: I0515 10:20:22.302941 1450 reconciler_common.go:299] "Volume detached for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/cbad5039-6a5e-4953-a8af-0271b172027b-cni-log-dir\") on node \"10.0.0.90\" DevicePath \"\"" May 15 10:20:22.303256 kubelet[1450]: I0515 10:20:22.302952 1450 reconciler_common.go:299] "Volume detached for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/cbad5039-6a5e-4953-a8af-0271b172027b-cni-bin-dir\") on node \"10.0.0.90\" DevicePath \"\"" May 15 10:20:22.303256 kubelet[1450]: I0515 10:20:22.302844 1450 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/cbad5039-6a5e-4953-a8af-0271b172027b-policysync" (OuterVolumeSpecName: "policysync") pod "cbad5039-6a5e-4953-a8af-0271b172027b" (UID: "cbad5039-6a5e-4953-a8af-0271b172027b"). InnerVolumeSpecName "policysync". PluginName "kubernetes.io/host-path", VolumeGIDValue "" May 15 10:20:22.303256 kubelet[1450]: I0515 10:20:22.302857 1450 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/cbad5039-6a5e-4953-a8af-0271b172027b-var-run-calico" (OuterVolumeSpecName: "var-run-calico") pod "cbad5039-6a5e-4953-a8af-0271b172027b" (UID: "cbad5039-6a5e-4953-a8af-0271b172027b"). InnerVolumeSpecName "var-run-calico". PluginName "kubernetes.io/host-path", VolumeGIDValue "" May 15 10:20:22.303256 kubelet[1450]: I0515 10:20:22.302977 1450 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/cbad5039-6a5e-4953-a8af-0271b172027b-flexvol-driver-host" (OuterVolumeSpecName: "flexvol-driver-host") pod "cbad5039-6a5e-4953-a8af-0271b172027b" (UID: "cbad5039-6a5e-4953-a8af-0271b172027b"). InnerVolumeSpecName "flexvol-driver-host". PluginName "kubernetes.io/host-path", VolumeGIDValue "" May 15 10:20:22.303256 kubelet[1450]: I0515 10:20:22.302990 1450 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/cbad5039-6a5e-4953-a8af-0271b172027b-xtables-lock" (OuterVolumeSpecName: "xtables-lock") pod "cbad5039-6a5e-4953-a8af-0271b172027b" (UID: "cbad5039-6a5e-4953-a8af-0271b172027b"). InnerVolumeSpecName "xtables-lock". PluginName "kubernetes.io/host-path", VolumeGIDValue "" May 15 10:20:22.303446 kubelet[1450]: I0515 10:20:22.303021 1450 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/cbad5039-6a5e-4953-a8af-0271b172027b-var-lib-calico" (OuterVolumeSpecName: "var-lib-calico") pod "cbad5039-6a5e-4953-a8af-0271b172027b" (UID: "cbad5039-6a5e-4953-a8af-0271b172027b"). InnerVolumeSpecName "var-lib-calico". PluginName "kubernetes.io/host-path", VolumeGIDValue "" May 15 10:20:22.303446 kubelet[1450]: I0515 10:20:22.303036 1450 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/cbad5039-6a5e-4953-a8af-0271b172027b-lib-modules" (OuterVolumeSpecName: "lib-modules") pod "cbad5039-6a5e-4953-a8af-0271b172027b" (UID: "cbad5039-6a5e-4953-a8af-0271b172027b"). InnerVolumeSpecName "lib-modules". PluginName "kubernetes.io/host-path", VolumeGIDValue "" May 15 10:20:22.303446 kubelet[1450]: I0515 10:20:22.303051 1450 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/cbad5039-6a5e-4953-a8af-0271b172027b-cni-net-dir" (OuterVolumeSpecName: "cni-net-dir") pod "cbad5039-6a5e-4953-a8af-0271b172027b" (UID: "cbad5039-6a5e-4953-a8af-0271b172027b"). InnerVolumeSpecName "cni-net-dir". PluginName "kubernetes.io/host-path", VolumeGIDValue "" May 15 10:20:22.308218 kubelet[1450]: I0515 10:20:22.308145 1450 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/cbad5039-6a5e-4953-a8af-0271b172027b-kube-api-access-ghdcv" (OuterVolumeSpecName: "kube-api-access-ghdcv") pod "cbad5039-6a5e-4953-a8af-0271b172027b" (UID: "cbad5039-6a5e-4953-a8af-0271b172027b"). InnerVolumeSpecName "kube-api-access-ghdcv". PluginName "kubernetes.io/projected", VolumeGIDValue "" May 15 10:20:22.309014 kubelet[1450]: I0515 10:20:22.308974 1450 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/cbad5039-6a5e-4953-a8af-0271b172027b-node-certs" (OuterVolumeSpecName: "node-certs") pod "cbad5039-6a5e-4953-a8af-0271b172027b" (UID: "cbad5039-6a5e-4953-a8af-0271b172027b"). InnerVolumeSpecName "node-certs". PluginName "kubernetes.io/secret", VolumeGIDValue "" May 15 10:20:22.310442 kubelet[1450]: I0515 10:20:22.310405 1450 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/cbad5039-6a5e-4953-a8af-0271b172027b-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "cbad5039-6a5e-4953-a8af-0271b172027b" (UID: "cbad5039-6a5e-4953-a8af-0271b172027b"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGIDValue "" May 15 10:20:22.319998 kubelet[1450]: I0515 10:20:22.319956 1450 memory_manager.go:355] "RemoveStaleState removing state" podUID="cbad5039-6a5e-4953-a8af-0271b172027b" containerName="calico-node" May 15 10:20:22.324529 systemd[1]: Created slice kubepods-besteffort-podb8c23843_1fb0_498a_8089_3904bd031a7a.slice. May 15 10:20:22.403960 kubelet[1450]: I0515 10:20:22.403902 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/b8c23843-1fb0-498a-8089-3904bd031a7a-node-certs\") pod \"calico-node-qxq22\" (UID: \"b8c23843-1fb0-498a-8089-3904bd031a7a\") " pod="calico-system/calico-node-qxq22" May 15 10:20:22.403960 kubelet[1450]: I0515 10:20:22.403953 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/b8c23843-1fb0-498a-8089-3904bd031a7a-xtables-lock\") pod \"calico-node-qxq22\" (UID: \"b8c23843-1fb0-498a-8089-3904bd031a7a\") " pod="calico-system/calico-node-qxq22" May 15 10:20:22.403960 kubelet[1450]: I0515 10:20:22.403969 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/b8c23843-1fb0-498a-8089-3904bd031a7a-policysync\") pod \"calico-node-qxq22\" (UID: \"b8c23843-1fb0-498a-8089-3904bd031a7a\") " pod="calico-system/calico-node-qxq22" May 15 10:20:22.404158 kubelet[1450]: I0515 10:20:22.403984 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/b8c23843-1fb0-498a-8089-3904bd031a7a-var-lib-calico\") pod \"calico-node-qxq22\" (UID: \"b8c23843-1fb0-498a-8089-3904bd031a7a\") " pod="calico-system/calico-node-qxq22" May 15 10:20:22.404158 kubelet[1450]: I0515 10:20:22.404002 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8q99v\" (UniqueName: \"kubernetes.io/projected/b8c23843-1fb0-498a-8089-3904bd031a7a-kube-api-access-8q99v\") pod \"calico-node-qxq22\" (UID: \"b8c23843-1fb0-498a-8089-3904bd031a7a\") " pod="calico-system/calico-node-qxq22" May 15 10:20:22.404158 kubelet[1450]: I0515 10:20:22.404021 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b8c23843-1fb0-498a-8089-3904bd031a7a-tigera-ca-bundle\") pod \"calico-node-qxq22\" (UID: \"b8c23843-1fb0-498a-8089-3904bd031a7a\") " pod="calico-system/calico-node-qxq22" May 15 10:20:22.404158 kubelet[1450]: I0515 10:20:22.404037 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/b8c23843-1fb0-498a-8089-3904bd031a7a-cni-log-dir\") pod \"calico-node-qxq22\" (UID: \"b8c23843-1fb0-498a-8089-3904bd031a7a\") " pod="calico-system/calico-node-qxq22" May 15 10:20:22.404158 kubelet[1450]: I0515 10:20:22.404053 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/b8c23843-1fb0-498a-8089-3904bd031a7a-lib-modules\") pod \"calico-node-qxq22\" (UID: \"b8c23843-1fb0-498a-8089-3904bd031a7a\") " pod="calico-system/calico-node-qxq22" May 15 10:20:22.404369 kubelet[1450]: I0515 10:20:22.404069 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/b8c23843-1fb0-498a-8089-3904bd031a7a-var-run-calico\") pod \"calico-node-qxq22\" (UID: \"b8c23843-1fb0-498a-8089-3904bd031a7a\") " pod="calico-system/calico-node-qxq22" May 15 10:20:22.404369 kubelet[1450]: I0515 10:20:22.404082 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/b8c23843-1fb0-498a-8089-3904bd031a7a-cni-bin-dir\") pod \"calico-node-qxq22\" (UID: \"b8c23843-1fb0-498a-8089-3904bd031a7a\") " pod="calico-system/calico-node-qxq22" May 15 10:20:22.404369 kubelet[1450]: I0515 10:20:22.404097 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/b8c23843-1fb0-498a-8089-3904bd031a7a-cni-net-dir\") pod \"calico-node-qxq22\" (UID: \"b8c23843-1fb0-498a-8089-3904bd031a7a\") " pod="calico-system/calico-node-qxq22" May 15 10:20:22.404369 kubelet[1450]: I0515 10:20:22.404114 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/b8c23843-1fb0-498a-8089-3904bd031a7a-flexvol-driver-host\") pod \"calico-node-qxq22\" (UID: \"b8c23843-1fb0-498a-8089-3904bd031a7a\") " pod="calico-system/calico-node-qxq22" May 15 10:20:22.404369 kubelet[1450]: I0515 10:20:22.404134 1450 reconciler_common.go:299] "Volume detached for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/cbad5039-6a5e-4953-a8af-0271b172027b-xtables-lock\") on node \"10.0.0.90\" DevicePath \"\"" May 15 10:20:22.404369 kubelet[1450]: I0515 10:20:22.404144 1450 reconciler_common.go:299] "Volume detached for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/cbad5039-6a5e-4953-a8af-0271b172027b-var-lib-calico\") on node \"10.0.0.90\" DevicePath \"\"" May 15 10:20:22.404502 kubelet[1450]: I0515 10:20:22.404153 1450 reconciler_common.go:299] "Volume detached for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/cbad5039-6a5e-4953-a8af-0271b172027b-lib-modules\") on node \"10.0.0.90\" DevicePath \"\"" May 15 10:20:22.404502 kubelet[1450]: I0515 10:20:22.404162 1450 reconciler_common.go:299] "Volume detached for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/cbad5039-6a5e-4953-a8af-0271b172027b-flexvol-driver-host\") on node \"10.0.0.90\" DevicePath \"\"" May 15 10:20:22.404502 kubelet[1450]: I0515 10:20:22.404171 1450 reconciler_common.go:299] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/cbad5039-6a5e-4953-a8af-0271b172027b-tigera-ca-bundle\") on node \"10.0.0.90\" DevicePath \"\"" May 15 10:20:22.404502 kubelet[1450]: I0515 10:20:22.404180 1450 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-ghdcv\" (UniqueName: \"kubernetes.io/projected/cbad5039-6a5e-4953-a8af-0271b172027b-kube-api-access-ghdcv\") on node \"10.0.0.90\" DevicePath \"\"" May 15 10:20:22.404502 kubelet[1450]: I0515 10:20:22.404188 1450 reconciler_common.go:299] "Volume detached for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/cbad5039-6a5e-4953-a8af-0271b172027b-policysync\") on node \"10.0.0.90\" DevicePath \"\"" May 15 10:20:22.404502 kubelet[1450]: I0515 10:20:22.404215 1450 reconciler_common.go:299] "Volume detached for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/cbad5039-6a5e-4953-a8af-0271b172027b-var-run-calico\") on node \"10.0.0.90\" DevicePath \"\"" May 15 10:20:22.404502 kubelet[1450]: I0515 10:20:22.404230 1450 reconciler_common.go:299] "Volume detached for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/cbad5039-6a5e-4953-a8af-0271b172027b-node-certs\") on node \"10.0.0.90\" DevicePath \"\"" May 15 10:20:22.404502 kubelet[1450]: I0515 10:20:22.404238 1450 reconciler_common.go:299] "Volume detached for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/cbad5039-6a5e-4953-a8af-0271b172027b-cni-net-dir\") on node \"10.0.0.90\" DevicePath \"\"" May 15 10:20:22.630259 kubelet[1450]: E0515 10:20:22.629027 1450 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:20:22.630368 env[1212]: time="2025-05-15T10:20:22.629523935Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-qxq22,Uid:b8c23843-1fb0-498a-8089-3904bd031a7a,Namespace:calico-system,Attempt:0,}" May 15 10:20:22.635493 kubelet[1450]: E0515 10:20:22.635461 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:20:22.645327 env[1212]: time="2025-05-15T10:20:22.645260253Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:20:22.645327 env[1212]: time="2025-05-15T10:20:22.645304049Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:20:22.645327 env[1212]: time="2025-05-15T10:20:22.645317768Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:20:22.645494 env[1212]: time="2025-05-15T10:20:22.645430478Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/60146f15b22222893b94fa8fc04cb3b4334920d981e6eca5da922d73097caf49 pid=3185 runtime=io.containerd.runc.v2 May 15 10:20:22.654423 systemd[1]: Started cri-containerd-60146f15b22222893b94fa8fc04cb3b4334920d981e6eca5da922d73097caf49.scope. May 15 10:20:22.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.680666 kernel: kauditd_printk_skb: 139 callbacks suppressed May 15 10:20:22.680722 kernel: audit: type=1400 audit(1747304422.678:836): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.685676 kernel: audit: type=1400 audit(1747304422.678:837): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.685746 kernel: audit: type=1400 audit(1747304422.678:838): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.690354 kernel: audit: type=1400 audit(1747304422.678:839): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.690423 kernel: audit: type=1400 audit(1747304422.678:840): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.695063 kernel: audit: type=1400 audit(1747304422.678:841): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.695121 kernel: audit: type=1400 audit(1747304422.678:842): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.700021 kernel: audit: type=1400 audit(1747304422.678:843): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.703050 kernel: audit: type=1400 audit(1747304422.678:844): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.705664 kernel: audit: type=1400 audit(1747304422.679:845): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.679000 audit: BPF prog-id=138 op=LOAD May 15 10:20:22.682000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.682000 audit[3194]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3185 pid=3194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:22.682000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630313436663135623232323232383933623934666138666330346362 May 15 10:20:22.682000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.682000 audit[3194]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3185 pid=3194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:22.682000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630313436663135623232323232383933623934666138666330346362 May 15 10:20:22.682000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.682000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.682000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.682000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.682000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.682000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.682000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.682000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.682000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.682000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.682000 audit: BPF prog-id=139 op=LOAD May 15 10:20:22.682000 audit[3194]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3185 pid=3194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:22.682000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630313436663135623232323232383933623934666138666330346362 May 15 10:20:22.684000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.684000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.684000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.684000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.684000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.684000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.684000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.684000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.684000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.684000 audit: BPF prog-id=140 op=LOAD May 15 10:20:22.684000 audit[3194]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3185 pid=3194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:22.684000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630313436663135623232323232383933623934666138666330346362 May 15 10:20:22.686000 audit: BPF prog-id=140 op=UNLOAD May 15 10:20:22.686000 audit: BPF prog-id=139 op=UNLOAD May 15 10:20:22.686000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.686000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.686000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.686000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.686000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.686000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.686000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.686000 audit[3194]: AVC avc: denied { perfmon } for pid=3194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.686000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.686000 audit[3194]: AVC avc: denied { bpf } for pid=3194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.686000 audit: BPF prog-id=141 op=LOAD May 15 10:20:22.686000 audit[3194]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3185 pid=3194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:22.686000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630313436663135623232323232383933623934666138666330346362 May 15 10:20:22.710589 env[1212]: time="2025-05-15T10:20:22.710549156Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-qxq22,Uid:b8c23843-1fb0-498a-8089-3904bd031a7a,Namespace:calico-system,Attempt:0,} returns sandbox id \"60146f15b22222893b94fa8fc04cb3b4334920d981e6eca5da922d73097caf49\"" May 15 10:20:22.712095 kubelet[1450]: E0515 10:20:22.711560 1450 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:20:22.713856 env[1212]: time="2025-05-15T10:20:22.713818545Z" level=info msg="CreateContainer within sandbox \"60146f15b22222893b94fa8fc04cb3b4334920d981e6eca5da922d73097caf49\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 15 10:20:22.724711 env[1212]: time="2025-05-15T10:20:22.724660099Z" level=info msg="CreateContainer within sandbox \"60146f15b22222893b94fa8fc04cb3b4334920d981e6eca5da922d73097caf49\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"6b66e1becb21cae0ad591f3435e654c92f4172a0ef8315dc36540ae875d5974a\"" May 15 10:20:22.725355 env[1212]: time="2025-05-15T10:20:22.725327440Z" level=info msg="StartContainer for \"6b66e1becb21cae0ad591f3435e654c92f4172a0ef8315dc36540ae875d5974a\"" May 15 10:20:22.749290 systemd[1]: Started cri-containerd-6b66e1becb21cae0ad591f3435e654c92f4172a0ef8315dc36540ae875d5974a.scope. May 15 10:20:22.772000 audit[3230]: AVC avc: denied { perfmon } for pid=3230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.772000 audit[3230]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3185 pid=3230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:22.772000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662363665316265636232316361653061643539316633343335653635 May 15 10:20:22.772000 audit[3230]: AVC avc: denied { bpf } for pid=3230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.772000 audit[3230]: AVC avc: denied { bpf } for pid=3230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.772000 audit[3230]: AVC avc: denied { bpf } for pid=3230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.772000 audit[3230]: AVC avc: denied { perfmon } for pid=3230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.772000 audit[3230]: AVC avc: denied { perfmon } for pid=3230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.772000 audit[3230]: AVC avc: denied { perfmon } for pid=3230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.772000 audit[3230]: AVC avc: denied { perfmon } for pid=3230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.772000 audit[3230]: AVC avc: denied { perfmon } for pid=3230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.772000 audit[3230]: AVC avc: denied { bpf } for pid=3230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.772000 audit[3230]: AVC avc: denied { bpf } for pid=3230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.772000 audit: BPF prog-id=142 op=LOAD May 15 10:20:22.772000 audit[3230]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3185 pid=3230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:22.772000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662363665316265636232316361653061643539316633343335653635 May 15 10:20:22.773000 audit[3230]: AVC avc: denied { bpf } for pid=3230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.773000 audit[3230]: AVC avc: denied { bpf } for pid=3230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.773000 audit[3230]: AVC avc: denied { perfmon } for pid=3230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.773000 audit[3230]: AVC avc: denied { perfmon } for pid=3230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.773000 audit[3230]: AVC avc: denied { perfmon } for pid=3230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.773000 audit[3230]: AVC avc: denied { perfmon } for pid=3230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.773000 audit[3230]: AVC avc: denied { perfmon } for pid=3230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.773000 audit[3230]: AVC avc: denied { bpf } for pid=3230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.773000 audit[3230]: AVC avc: denied { bpf } for pid=3230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.773000 audit: BPF prog-id=143 op=LOAD May 15 10:20:22.773000 audit[3230]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3185 pid=3230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:22.773000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662363665316265636232316361653061643539316633343335653635 May 15 10:20:22.773000 audit: BPF prog-id=143 op=UNLOAD May 15 10:20:22.773000 audit: BPF prog-id=142 op=UNLOAD May 15 10:20:22.773000 audit[3230]: AVC avc: denied { bpf } for pid=3230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.773000 audit[3230]: AVC avc: denied { bpf } for pid=3230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.773000 audit[3230]: AVC avc: denied { bpf } for pid=3230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.773000 audit[3230]: AVC avc: denied { perfmon } for pid=3230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.773000 audit[3230]: AVC avc: denied { perfmon } for pid=3230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.773000 audit[3230]: AVC avc: denied { perfmon } for pid=3230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.773000 audit[3230]: AVC avc: denied { perfmon } for pid=3230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.773000 audit[3230]: AVC avc: denied { perfmon } for pid=3230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.773000 audit[3230]: AVC avc: denied { bpf } for pid=3230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.773000 audit[3230]: AVC avc: denied { bpf } for pid=3230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.773000 audit: BPF prog-id=144 op=LOAD May 15 10:20:22.773000 audit[3230]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3185 pid=3230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:22.773000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662363665316265636232316361653061643539316633343335653635 May 15 10:20:22.788266 env[1212]: time="2025-05-15T10:20:22.788212677Z" level=info msg="StartContainer for \"6b66e1becb21cae0ad591f3435e654c92f4172a0ef8315dc36540ae875d5974a\" returns successfully" May 15 10:20:22.810346 systemd[1]: Removed slice kubepods-besteffort-podcbad5039_6a5e_4953_a8af_0271b172027b.slice. May 15 10:20:22.810431 systemd[1]: kubepods-besteffort-podcbad5039_6a5e_4953_a8af_0271b172027b.slice: Consumed 2.099s CPU time. May 15 10:20:22.812144 systemd[1]: cri-containerd-6b66e1becb21cae0ad591f3435e654c92f4172a0ef8315dc36540ae875d5974a.scope: Deactivated successfully. May 15 10:20:22.815000 audit: BPF prog-id=144 op=UNLOAD May 15 10:20:22.849569 env[1212]: time="2025-05-15T10:20:22.848380837Z" level=info msg="shim disconnected" id=6b66e1becb21cae0ad591f3435e654c92f4172a0ef8315dc36540ae875d5974a May 15 10:20:22.849569 env[1212]: time="2025-05-15T10:20:22.848426953Z" level=warning msg="cleaning up after shim disconnected" id=6b66e1becb21cae0ad591f3435e654c92f4172a0ef8315dc36540ae875d5974a namespace=k8s.io May 15 10:20:22.849569 env[1212]: time="2025-05-15T10:20:22.848439431Z" level=info msg="cleaning up dead shim" May 15 10:20:22.858078 env[1212]: time="2025-05-15T10:20:22.858025697Z" level=warning msg="cleanup warnings time=\"2025-05-15T10:20:22Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3268 runtime=io.containerd.runc.v2\n" May 15 10:20:22.916223 kubelet[1450]: E0515 10:20:22.915976 1450 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:20:22.917819 env[1212]: time="2025-05-15T10:20:22.917774654Z" level=info msg="CreateContainer within sandbox \"60146f15b22222893b94fa8fc04cb3b4334920d981e6eca5da922d73097caf49\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 15 10:20:22.920228 kubelet[1450]: I0515 10:20:22.920107 1450 scope.go:117] "RemoveContainer" containerID="c3e24861ca0a3368eeb893100fc72fa62d309afcb6a27ba9599b6e6abdcf66db" May 15 10:20:22.922907 env[1212]: time="2025-05-15T10:20:22.922856561Z" level=info msg="RemoveContainer for \"c3e24861ca0a3368eeb893100fc72fa62d309afcb6a27ba9599b6e6abdcf66db\"" May 15 10:20:22.928073 env[1212]: time="2025-05-15T10:20:22.927933709Z" level=info msg="RemoveContainer for \"c3e24861ca0a3368eeb893100fc72fa62d309afcb6a27ba9599b6e6abdcf66db\" returns successfully" May 15 10:20:22.928247 kubelet[1450]: I0515 10:20:22.928224 1450 scope.go:117] "RemoveContainer" containerID="ba92bd157df37523feb79f972ee67da67d611344547bd6c9f4f3d9b2173bfb2d" May 15 10:20:22.931363 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c3e24861ca0a3368eeb893100fc72fa62d309afcb6a27ba9599b6e6abdcf66db-rootfs.mount: Deactivated successfully. May 15 10:20:22.931449 systemd[1]: var-lib-kubelet-pods-cbad5039\x2d6a5e\x2d4953\x2da8af\x2d0271b172027b-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dnode-1.mount: Deactivated successfully. May 15 10:20:22.931510 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-389ffa7fe80f06e188c15a4ae7b3c533a98302f393d377d965e26d6514fcac24-rootfs.mount: Deactivated successfully. May 15 10:20:22.931566 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-389ffa7fe80f06e188c15a4ae7b3c533a98302f393d377d965e26d6514fcac24-shm.mount: Deactivated successfully. May 15 10:20:22.931615 systemd[1]: var-lib-kubelet-pods-cbad5039\x2d6a5e\x2d4953\x2da8af\x2d0271b172027b-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dghdcv.mount: Deactivated successfully. May 15 10:20:22.931664 systemd[1]: var-lib-kubelet-pods-cbad5039\x2d6a5e\x2d4953\x2da8af\x2d0271b172027b-volumes-kubernetes.io\x7esecret-node\x2dcerts.mount: Deactivated successfully. May 15 10:20:22.933704 env[1212]: time="2025-05-15T10:20:22.933365385Z" level=info msg="RemoveContainer for \"ba92bd157df37523feb79f972ee67da67d611344547bd6c9f4f3d9b2173bfb2d\"" May 15 10:20:22.936701 env[1212]: time="2025-05-15T10:20:22.936655652Z" level=info msg="CreateContainer within sandbox \"60146f15b22222893b94fa8fc04cb3b4334920d981e6eca5da922d73097caf49\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"65f4b0b999f73fa437679d884254b9685c323ab41eacbc03ddde7a0abc2c6682\"" May 15 10:20:22.937965 env[1212]: time="2025-05-15T10:20:22.937926539Z" level=info msg="StartContainer for \"65f4b0b999f73fa437679d884254b9685c323ab41eacbc03ddde7a0abc2c6682\"" May 15 10:20:22.938820 env[1212]: time="2025-05-15T10:20:22.938790902Z" level=info msg="RemoveContainer for \"ba92bd157df37523feb79f972ee67da67d611344547bd6c9f4f3d9b2173bfb2d\" returns successfully" May 15 10:20:22.939093 kubelet[1450]: I0515 10:20:22.939070 1450 scope.go:117] "RemoveContainer" containerID="afcab0498870f58d90bb510f537b78fb2a906ddc0c87150fc024119d8e9b244b" May 15 10:20:22.940759 env[1212]: time="2025-05-15T10:20:22.940725449Z" level=info msg="RemoveContainer for \"afcab0498870f58d90bb510f537b78fb2a906ddc0c87150fc024119d8e9b244b\"" May 15 10:20:22.943009 env[1212]: time="2025-05-15T10:20:22.942969769Z" level=info msg="RemoveContainer for \"afcab0498870f58d90bb510f537b78fb2a906ddc0c87150fc024119d8e9b244b\" returns successfully" May 15 10:20:22.943243 kubelet[1450]: I0515 10:20:22.943218 1450 scope.go:117] "RemoveContainer" containerID="c3e24861ca0a3368eeb893100fc72fa62d309afcb6a27ba9599b6e6abdcf66db" May 15 10:20:22.943613 env[1212]: time="2025-05-15T10:20:22.943509561Z" level=error msg="ContainerStatus for \"c3e24861ca0a3368eeb893100fc72fa62d309afcb6a27ba9599b6e6abdcf66db\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"c3e24861ca0a3368eeb893100fc72fa62d309afcb6a27ba9599b6e6abdcf66db\": not found" May 15 10:20:22.943715 kubelet[1450]: E0515 10:20:22.943694 1450 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"c3e24861ca0a3368eeb893100fc72fa62d309afcb6a27ba9599b6e6abdcf66db\": not found" containerID="c3e24861ca0a3368eeb893100fc72fa62d309afcb6a27ba9599b6e6abdcf66db" May 15 10:20:22.943754 kubelet[1450]: I0515 10:20:22.943720 1450 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"c3e24861ca0a3368eeb893100fc72fa62d309afcb6a27ba9599b6e6abdcf66db"} err="failed to get container status \"c3e24861ca0a3368eeb893100fc72fa62d309afcb6a27ba9599b6e6abdcf66db\": rpc error: code = NotFound desc = an error occurred when try to find container \"c3e24861ca0a3368eeb893100fc72fa62d309afcb6a27ba9599b6e6abdcf66db\": not found" May 15 10:20:22.943754 kubelet[1450]: I0515 10:20:22.943743 1450 scope.go:117] "RemoveContainer" containerID="ba92bd157df37523feb79f972ee67da67d611344547bd6c9f4f3d9b2173bfb2d" May 15 10:20:22.945440 env[1212]: time="2025-05-15T10:20:22.945354877Z" level=error msg="ContainerStatus for \"ba92bd157df37523feb79f972ee67da67d611344547bd6c9f4f3d9b2173bfb2d\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"ba92bd157df37523feb79f972ee67da67d611344547bd6c9f4f3d9b2173bfb2d\": not found" May 15 10:20:22.945781 kubelet[1450]: E0515 10:20:22.945754 1450 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"ba92bd157df37523feb79f972ee67da67d611344547bd6c9f4f3d9b2173bfb2d\": not found" containerID="ba92bd157df37523feb79f972ee67da67d611344547bd6c9f4f3d9b2173bfb2d" May 15 10:20:22.945919 kubelet[1450]: I0515 10:20:22.945895 1450 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"ba92bd157df37523feb79f972ee67da67d611344547bd6c9f4f3d9b2173bfb2d"} err="failed to get container status \"ba92bd157df37523feb79f972ee67da67d611344547bd6c9f4f3d9b2173bfb2d\": rpc error: code = NotFound desc = an error occurred when try to find container \"ba92bd157df37523feb79f972ee67da67d611344547bd6c9f4f3d9b2173bfb2d\": not found" May 15 10:20:22.946261 kubelet[1450]: I0515 10:20:22.946243 1450 scope.go:117] "RemoveContainer" containerID="afcab0498870f58d90bb510f537b78fb2a906ddc0c87150fc024119d8e9b244b" May 15 10:20:22.948408 env[1212]: time="2025-05-15T10:20:22.948242820Z" level=error msg="ContainerStatus for \"afcab0498870f58d90bb510f537b78fb2a906ddc0c87150fc024119d8e9b244b\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"afcab0498870f58d90bb510f537b78fb2a906ddc0c87150fc024119d8e9b244b\": not found" May 15 10:20:22.948689 kubelet[1450]: E0515 10:20:22.948632 1450 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"afcab0498870f58d90bb510f537b78fb2a906ddc0c87150fc024119d8e9b244b\": not found" containerID="afcab0498870f58d90bb510f537b78fb2a906ddc0c87150fc024119d8e9b244b" May 15 10:20:22.948689 kubelet[1450]: I0515 10:20:22.948663 1450 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"afcab0498870f58d90bb510f537b78fb2a906ddc0c87150fc024119d8e9b244b"} err="failed to get container status \"afcab0498870f58d90bb510f537b78fb2a906ddc0c87150fc024119d8e9b244b\": rpc error: code = NotFound desc = an error occurred when try to find container \"afcab0498870f58d90bb510f537b78fb2a906ddc0c87150fc024119d8e9b244b\": not found" May 15 10:20:22.961550 systemd[1]: run-containerd-runc-k8s.io-65f4b0b999f73fa437679d884254b9685c323ab41eacbc03ddde7a0abc2c6682-runc.6wz0Me.mount: Deactivated successfully. May 15 10:20:22.963087 systemd[1]: Started cri-containerd-65f4b0b999f73fa437679d884254b9685c323ab41eacbc03ddde7a0abc2c6682.scope. May 15 10:20:22.979000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.979000 audit[3289]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=3185 pid=3289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:22.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635663462306239393966373366613433373637396438383432353462 May 15 10:20:22.979000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.979000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.979000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.979000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.979000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.979000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.979000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.979000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.979000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.979000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.979000 audit: BPF prog-id=145 op=LOAD May 15 10:20:22.979000 audit[3289]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=3185 pid=3289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:22.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635663462306239393966373366613433373637396438383432353462 May 15 10:20:22.979000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.979000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.979000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.979000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.979000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.979000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.979000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.979000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.979000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.979000 audit: BPF prog-id=146 op=LOAD May 15 10:20:22.979000 audit[3289]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=3185 pid=3289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:22.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635663462306239393966373366613433373637396438383432353462 May 15 10:20:22.979000 audit: BPF prog-id=146 op=UNLOAD May 15 10:20:22.979000 audit: BPF prog-id=145 op=UNLOAD May 15 10:20:22.979000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.979000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.979000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.979000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.979000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.979000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.979000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.979000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.979000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.979000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:22.979000 audit: BPF prog-id=147 op=LOAD May 15 10:20:22.979000 audit[3289]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=3185 pid=3289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:22.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635663462306239393966373366613433373637396438383432353462 May 15 10:20:22.993289 env[1212]: time="2025-05-15T10:20:22.993149539Z" level=info msg="StartContainer for \"65f4b0b999f73fa437679d884254b9685c323ab41eacbc03ddde7a0abc2c6682\" returns successfully" May 15 10:20:23.616130 systemd[1]: cri-containerd-65f4b0b999f73fa437679d884254b9685c323ab41eacbc03ddde7a0abc2c6682.scope: Deactivated successfully. May 15 10:20:23.623000 audit: BPF prog-id=147 op=UNLOAD May 15 10:20:23.636273 kubelet[1450]: E0515 10:20:23.636189 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:20:23.652952 env[1212]: time="2025-05-15T10:20:23.652896152Z" level=info msg="shim disconnected" id=65f4b0b999f73fa437679d884254b9685c323ab41eacbc03ddde7a0abc2c6682 May 15 10:20:23.652952 env[1212]: time="2025-05-15T10:20:23.652943908Z" level=warning msg="cleaning up after shim disconnected" id=65f4b0b999f73fa437679d884254b9685c323ab41eacbc03ddde7a0abc2c6682 namespace=k8s.io May 15 10:20:23.652952 env[1212]: time="2025-05-15T10:20:23.652953587Z" level=info msg="cleaning up dead shim" May 15 10:20:23.659011 env[1212]: time="2025-05-15T10:20:23.658970804Z" level=warning msg="cleanup warnings time=\"2025-05-15T10:20:23Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3335 runtime=io.containerd.runc.v2\n" May 15 10:20:23.899796 env[1212]: time="2025-05-15T10:20:23.899694418Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:20:23.901587 env[1212]: time="2025-05-15T10:20:23.901557343Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:26e730979a07ea7452715da6ac48076016018bc982c06ebd32d5e095f42d3d54,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:20:23.903128 env[1212]: time="2025-05-15T10:20:23.903078815Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:20:23.904497 env[1212]: time="2025-05-15T10:20:23.904462060Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f5516aa6a78f00931d2625f3012dcf2c69d141ce41483b8d59c6ec6330a18620,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:20:23.904968 env[1212]: time="2025-05-15T10:20:23.904931021Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\" returns image reference \"sha256:26e730979a07ea7452715da6ac48076016018bc982c06ebd32d5e095f42d3d54\"" May 15 10:20:23.911220 env[1212]: time="2025-05-15T10:20:23.911178979Z" level=info msg="CreateContainer within sandbox \"888314438c5359b9b8a14a23861b90cc3bdc3ec5f0b4965c2ad7ec16a76a6b31\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 15 10:20:23.919254 env[1212]: time="2025-05-15T10:20:23.919221267Z" level=info msg="CreateContainer within sandbox \"888314438c5359b9b8a14a23861b90cc3bdc3ec5f0b4965c2ad7ec16a76a6b31\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"ecf7eeeb1c5dac16dba40c48775ca99cdf917944f44f9868b281d9612141e396\"" May 15 10:20:23.919679 env[1212]: time="2025-05-15T10:20:23.919656911Z" level=info msg="StartContainer for \"ecf7eeeb1c5dac16dba40c48775ca99cdf917944f44f9868b281d9612141e396\"" May 15 10:20:23.923897 kubelet[1450]: E0515 10:20:23.923847 1450 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:20:23.931644 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-65f4b0b999f73fa437679d884254b9685c323ab41eacbc03ddde7a0abc2c6682-rootfs.mount: Deactivated successfully. May 15 10:20:23.935638 env[1212]: time="2025-05-15T10:20:23.935590140Z" level=info msg="CreateContainer within sandbox \"60146f15b22222893b94fa8fc04cb3b4334920d981e6eca5da922d73097caf49\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 15 10:20:23.939223 systemd[1]: Started cri-containerd-ecf7eeeb1c5dac16dba40c48775ca99cdf917944f44f9868b281d9612141e396.scope. May 15 10:20:23.949061 env[1212]: time="2025-05-15T10:20:23.949014499Z" level=info msg="CreateContainer within sandbox \"60146f15b22222893b94fa8fc04cb3b4334920d981e6eca5da922d73097caf49\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"2a6c76b5e9e997eb2942259fa179edeb0f44fa487662d44385b67f8fdc7e306c\"" May 15 10:20:23.949809 env[1212]: time="2025-05-15T10:20:23.949778675Z" level=info msg="StartContainer for \"2a6c76b5e9e997eb2942259fa179edeb0f44fa487662d44385b67f8fdc7e306c\"" May 15 10:20:23.965928 systemd[1]: Started cri-containerd-2a6c76b5e9e997eb2942259fa179edeb0f44fa487662d44385b67f8fdc7e306c.scope. May 15 10:20:23.989000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.989000 audit[3380]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=3185 pid=3380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:23.989000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261366337366235653965393937656232393432323539666131373965 May 15 10:20:23.989000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.989000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.989000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.989000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.989000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.989000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.989000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.989000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.989000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.989000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.989000 audit: BPF prog-id=148 op=LOAD May 15 10:20:23.989000 audit[3380]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=3185 pid=3380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:23.989000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261366337366235653965393937656232393432323539666131373965 May 15 10:20:23.989000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.989000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.989000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.989000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.989000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.989000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.989000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.989000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.989000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.989000 audit: BPF prog-id=149 op=LOAD May 15 10:20:23.989000 audit[3380]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=3185 pid=3380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:23.989000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261366337366235653965393937656232393432323539666131373965 May 15 10:20:23.989000 audit: BPF prog-id=149 op=UNLOAD May 15 10:20:23.990000 audit: BPF prog-id=148 op=UNLOAD May 15 10:20:23.990000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.990000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.990000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.990000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.990000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.990000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.990000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.990000 audit[3380]: AVC avc: denied { perfmon } for pid=3380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.990000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.990000 audit[3380]: AVC avc: denied { bpf } for pid=3380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.990000 audit: BPF prog-id=150 op=LOAD May 15 10:20:23.990000 audit[3380]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=3185 pid=3380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:23.990000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261366337366235653965393937656232393432323539666131373965 May 15 10:20:23.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.994000 audit: BPF prog-id=151 op=LOAD May 15 10:20:23.995000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.995000 audit[3357]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3082 pid=3357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:23.995000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563663765656562316335646163313664626134306334383737356361 May 15 10:20:23.995000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.995000 audit[3357]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3082 pid=3357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:23.995000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563663765656562316335646163313664626134306334383737356361 May 15 10:20:23.995000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.995000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.995000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.995000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.995000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.995000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.995000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.995000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.995000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.995000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.995000 audit: BPF prog-id=152 op=LOAD May 15 10:20:23.995000 audit[3357]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3082 pid=3357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:23.995000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563663765656562316335646163313664626134306334383737356361 May 15 10:20:23.995000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.995000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.995000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.995000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.995000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.995000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.995000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.995000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.995000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.995000 audit: BPF prog-id=153 op=LOAD May 15 10:20:23.995000 audit[3357]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3082 pid=3357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:23.995000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563663765656562316335646163313664626134306334383737356361 May 15 10:20:23.995000 audit: BPF prog-id=153 op=UNLOAD May 15 10:20:23.995000 audit: BPF prog-id=152 op=UNLOAD May 15 10:20:23.995000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.995000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.995000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.995000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.995000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.995000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.995000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.995000 audit[3357]: AVC avc: denied { perfmon } for pid=3357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.995000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.995000 audit[3357]: AVC avc: denied { bpf } for pid=3357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:23.995000 audit: BPF prog-id=154 op=LOAD May 15 10:20:23.995000 audit[3357]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3082 pid=3357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:23.995000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563663765656562316335646163313664626134306334383737356361 May 15 10:20:24.009934 env[1212]: time="2025-05-15T10:20:24.009634200Z" level=info msg="StartContainer for \"2a6c76b5e9e997eb2942259fa179edeb0f44fa487662d44385b67f8fdc7e306c\" returns successfully" May 15 10:20:24.031226 env[1212]: time="2025-05-15T10:20:24.030918493Z" level=info msg="StartContainer for \"ecf7eeeb1c5dac16dba40c48775ca99cdf917944f44f9868b281d9612141e396\" returns successfully" May 15 10:20:24.636821 kubelet[1450]: E0515 10:20:24.636765 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:20:24.806396 kubelet[1450]: I0515 10:20:24.806346 1450 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="cbad5039-6a5e-4953-a8af-0271b172027b" path="/var/lib/kubelet/pods/cbad5039-6a5e-4953-a8af-0271b172027b/volumes" May 15 10:20:24.932482 kubelet[1450]: E0515 10:20:24.932390 1450 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:20:24.934038 kubelet[1450]: E0515 10:20:24.934006 1450 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:20:24.964369 kubelet[1450]: I0515 10:20:24.964306 1450 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-7ddcb749d4-gmc4n" podStartSLOduration=2.206268673 podStartE2EDuration="3.964288927s" podCreationTimestamp="2025-05-15 10:20:21 +0000 UTC" firstStartedPulling="2025-05-15 10:20:22.147772415 +0000 UTC m=+48.253274638" lastFinishedPulling="2025-05-15 10:20:23.905792669 +0000 UTC m=+50.011294892" observedRunningTime="2025-05-15 10:20:24.963882879 +0000 UTC m=+51.069385102" watchObservedRunningTime="2025-05-15 10:20:24.964288927 +0000 UTC m=+51.069791150" May 15 10:20:24.964663 kubelet[1450]: I0515 10:20:24.964630 1450 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-qxq22" podStartSLOduration=2.964623181 podStartE2EDuration="2.964623181s" podCreationTimestamp="2025-05-15 10:20:22 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:20:24.951953213 +0000 UTC m=+51.057455436" watchObservedRunningTime="2025-05-15 10:20:24.964623181 +0000 UTC m=+51.070125404" May 15 10:20:24.974000 audit[3478]: NETFILTER_CFG table=filter:101 family=2 entries=8 op=nft_register_rule pid=3478 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:20:24.974000 audit[3478]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffe997fd30 a2=0 a3=1 items=0 ppid=1668 pid=3478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:24.974000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:20:24.980000 audit[3478]: NETFILTER_CFG table=nat:102 family=2 entries=56 op=nft_register_chain pid=3478 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:20:24.980000 audit[3478]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18692 a0=3 a1=ffffe997fd30 a2=0 a3=1 items=0 ppid=1668 pid=3478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:24.980000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:20:25.234000 audit[3513]: AVC avc: denied { write } for pid=3513 comm="tee" name="fd" dev="proc" ino=21064 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:20:25.234000 audit[3513]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe32faa2a a2=241 a3=1b6 items=1 ppid=3491 pid=3513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.234000 audit: CWD cwd="/etc/service/enabled/confd/log" May 15 10:20:25.234000 audit: PATH item=0 name="/dev/fd/63" inode=21060 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:20:25.234000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:20:25.235000 audit[3515]: AVC avc: denied { write } for pid=3515 comm="tee" name="fd" dev="proc" ino=21068 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:20:25.235000 audit[3515]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd651aa1a a2=241 a3=1b6 items=1 ppid=3497 pid=3515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.235000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 15 10:20:25.235000 audit: PATH item=0 name="/dev/fd/63" inode=21061 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:20:25.235000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:20:25.240000 audit[3530]: AVC avc: denied { write } for pid=3530 comm="tee" name="fd" dev="proc" ino=21076 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:20:25.240000 audit[3530]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc4e9ea2b a2=241 a3=1b6 items=1 ppid=3489 pid=3530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.240000 audit: CWD cwd="/etc/service/enabled/bird/log" May 15 10:20:25.240000 audit: PATH item=0 name="/dev/fd/63" inode=19223 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:20:25.240000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:20:25.244000 audit[3537]: AVC avc: denied { write } for pid=3537 comm="tee" name="fd" dev="proc" ino=21082 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:20:25.244000 audit[3537]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe6a7ba2a a2=241 a3=1b6 items=1 ppid=3496 pid=3537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.244000 audit: CWD cwd="/etc/service/enabled/felix/log" May 15 10:20:25.244000 audit: PATH item=0 name="/dev/fd/63" inode=18187 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:20:25.244000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:20:25.249000 audit[3539]: AVC avc: denied { write } for pid=3539 comm="tee" name="fd" dev="proc" ino=21090 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:20:25.249000 audit[3539]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd267da2c a2=241 a3=1b6 items=1 ppid=3490 pid=3539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.249000 audit: CWD cwd="/etc/service/enabled/cni/log" May 15 10:20:25.249000 audit: PATH item=0 name="/dev/fd/63" inode=20138 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:20:25.249000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:20:25.252000 audit[3551]: AVC avc: denied { write } for pid=3551 comm="tee" name="fd" dev="proc" ino=18191 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:20:25.252000 audit[3551]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffff57fa1b a2=241 a3=1b6 items=1 ppid=3500 pid=3551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.252000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 15 10:20:25.252000 audit: PATH item=0 name="/dev/fd/63" inode=19226 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:20:25.252000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:20:25.256000 audit[3553]: AVC avc: denied { write } for pid=3553 comm="tee" name="fd" dev="proc" ino=21094 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:20:25.256000 audit[3553]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffedf3fa2a a2=241 a3=1b6 items=1 ppid=3488 pid=3553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.256000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 15 10:20:25.256000 audit: PATH item=0 name="/dev/fd/63" inode=19227 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:20:25.256000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:20:25.363000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.363000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.363000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.363000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.363000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.363000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.363000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.363000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.363000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.363000 audit: BPF prog-id=155 op=LOAD May 15 10:20:25.363000 audit[3608]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffbe19208 a2=98 a3=fffffbe191f8 items=0 ppid=3498 pid=3608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.363000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:20:25.363000 audit: BPF prog-id=155 op=UNLOAD May 15 10:20:25.363000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.363000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.363000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.363000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.363000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.363000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.363000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.363000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.363000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.363000 audit: BPF prog-id=156 op=LOAD May 15 10:20:25.363000 audit[3608]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffffbe18e98 a2=74 a3=95 items=0 ppid=3498 pid=3608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.363000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:20:25.363000 audit: BPF prog-id=156 op=UNLOAD May 15 10:20:25.363000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.363000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.363000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.363000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.363000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.363000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.363000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.363000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.363000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.363000 audit: BPF prog-id=157 op=LOAD May 15 10:20:25.363000 audit[3608]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffffbe18ef8 a2=94 a3=2 items=0 ppid=3498 pid=3608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.363000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:20:25.363000 audit: BPF prog-id=157 op=UNLOAD May 15 10:20:25.447000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.447000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.447000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.447000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.447000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.447000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.447000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.447000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.447000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.447000 audit: BPF prog-id=158 op=LOAD May 15 10:20:25.447000 audit[3608]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffffbe18eb8 a2=40 a3=fffffbe18ee8 items=0 ppid=3498 pid=3608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.447000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:20:25.447000 audit: BPF prog-id=158 op=UNLOAD May 15 10:20:25.447000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.447000 audit[3608]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=fffffbe18fd0 a2=50 a3=0 items=0 ppid=3498 pid=3608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.447000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:20:25.456000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.456000 audit[3608]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffbe18f28 a2=28 a3=fffffbe19058 items=0 ppid=3498 pid=3608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.456000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:20:25.456000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.456000 audit[3608]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffbe18f58 a2=28 a3=fffffbe19088 items=0 ppid=3498 pid=3608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.456000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:20:25.456000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.456000 audit[3608]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffbe18e08 a2=28 a3=fffffbe18f38 items=0 ppid=3498 pid=3608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.456000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:20:25.456000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.456000 audit[3608]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffbe18f78 a2=28 a3=fffffbe190a8 items=0 ppid=3498 pid=3608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.456000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:20:25.456000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.456000 audit[3608]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffbe18f58 a2=28 a3=fffffbe19088 items=0 ppid=3498 pid=3608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.456000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:20:25.456000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.456000 audit[3608]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffbe18f48 a2=28 a3=fffffbe19078 items=0 ppid=3498 pid=3608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.456000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:20:25.456000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.456000 audit[3608]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffbe18f78 a2=28 a3=fffffbe190a8 items=0 ppid=3498 pid=3608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.456000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:20:25.456000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.456000 audit[3608]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffbe18f58 a2=28 a3=fffffbe19088 items=0 ppid=3498 pid=3608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.456000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:20:25.456000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.456000 audit[3608]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffbe18f78 a2=28 a3=fffffbe190a8 items=0 ppid=3498 pid=3608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.456000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:20:25.456000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.456000 audit[3608]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffbe18f48 a2=28 a3=fffffbe19078 items=0 ppid=3498 pid=3608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.456000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:20:25.456000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.456000 audit[3608]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffbe18fc8 a2=28 a3=fffffbe19108 items=0 ppid=3498 pid=3608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.456000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:20:25.456000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.456000 audit[3608]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffffbe18d00 a2=50 a3=0 items=0 ppid=3498 pid=3608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.456000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:20:25.456000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.456000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.456000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.456000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.456000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.456000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.456000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.456000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.456000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.456000 audit: BPF prog-id=159 op=LOAD May 15 10:20:25.456000 audit[3608]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffffbe18d08 a2=94 a3=5 items=0 ppid=3498 pid=3608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.456000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:20:25.456000 audit: BPF prog-id=159 op=UNLOAD May 15 10:20:25.456000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.456000 audit[3608]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffffbe18e10 a2=50 a3=0 items=0 ppid=3498 pid=3608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.456000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:20:25.456000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.456000 audit[3608]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=fffffbe18f58 a2=4 a3=3 items=0 ppid=3498 pid=3608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.456000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:20:25.456000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.456000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.456000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.456000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.456000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.456000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.456000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.456000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.456000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.456000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.456000 audit[3608]: AVC avc: denied { confidentiality } for pid=3608 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:25.456000 audit[3608]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffffbe18f38 a2=94 a3=6 items=0 ppid=3498 pid=3608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.456000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:20:25.456000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.456000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.456000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.456000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.456000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.456000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.456000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.456000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.456000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.456000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.456000 audit[3608]: AVC avc: denied { confidentiality } for pid=3608 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:25.456000 audit[3608]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffffbe18708 a2=94 a3=83 items=0 ppid=3498 pid=3608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.456000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:20:25.456000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.456000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.456000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.456000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.456000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.456000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.456000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.456000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.456000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.456000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.456000 audit[3608]: AVC avc: denied { confidentiality } for pid=3608 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:25.456000 audit[3608]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffffbe18708 a2=94 a3=83 items=0 ppid=3498 pid=3608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.456000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:20:25.468000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.468000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.468000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.468000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.468000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.468000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.468000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.468000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.468000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.468000 audit: BPF prog-id=160 op=LOAD May 15 10:20:25.468000 audit[3611]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd1ce3218 a2=98 a3=ffffd1ce3208 items=0 ppid=3498 pid=3611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.468000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 10:20:25.469000 audit: BPF prog-id=160 op=UNLOAD May 15 10:20:25.469000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.469000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.469000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.469000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.469000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.469000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.469000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.469000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.469000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.469000 audit: BPF prog-id=161 op=LOAD May 15 10:20:25.469000 audit[3611]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd1ce30c8 a2=74 a3=95 items=0 ppid=3498 pid=3611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.469000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 10:20:25.469000 audit: BPF prog-id=161 op=UNLOAD May 15 10:20:25.469000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.469000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.469000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.469000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.469000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.469000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.469000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.469000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.469000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.469000 audit: BPF prog-id=162 op=LOAD May 15 10:20:25.469000 audit[3611]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd1ce30f8 a2=40 a3=ffffd1ce3128 items=0 ppid=3498 pid=3611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.469000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 10:20:25.469000 audit: BPF prog-id=162 op=UNLOAD May 15 10:20:25.529000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.529000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.529000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.529000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.529000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.529000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.529000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.529000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.529000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.529000 audit: BPF prog-id=163 op=LOAD May 15 10:20:25.529000 audit[3634]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe36399a8 a2=98 a3=ffffe3639998 items=0 ppid=3498 pid=3634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.529000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:20:25.530000 audit: BPF prog-id=163 op=UNLOAD May 15 10:20:25.530000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.530000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.530000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.530000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.530000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.530000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.530000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.530000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.530000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.530000 audit: BPF prog-id=164 op=LOAD May 15 10:20:25.530000 audit[3634]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe3639688 a2=74 a3=95 items=0 ppid=3498 pid=3634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.530000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:20:25.530000 audit: BPF prog-id=164 op=UNLOAD May 15 10:20:25.531000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.531000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.531000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.531000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.531000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.531000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.531000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.531000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.531000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.531000 audit: BPF prog-id=165 op=LOAD May 15 10:20:25.531000 audit[3634]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe36396e8 a2=94 a3=2 items=0 ppid=3498 pid=3634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.531000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:20:25.531000 audit: BPF prog-id=165 op=UNLOAD May 15 10:20:25.531000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.531000 audit[3634]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffe3639718 a2=28 a3=ffffe3639848 items=0 ppid=3498 pid=3634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.531000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:20:25.531000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.531000 audit[3634]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe3639748 a2=28 a3=ffffe3639878 items=0 ppid=3498 pid=3634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.531000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:20:25.531000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.531000 audit[3634]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe36395f8 a2=28 a3=ffffe3639728 items=0 ppid=3498 pid=3634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.531000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:20:25.531000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.531000 audit[3634]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffe3639768 a2=28 a3=ffffe3639898 items=0 ppid=3498 pid=3634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.531000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:20:25.531000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.531000 audit[3634]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffe3639748 a2=28 a3=ffffe3639878 items=0 ppid=3498 pid=3634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.531000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:20:25.531000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.531000 audit[3634]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffe3639738 a2=28 a3=ffffe3639868 items=0 ppid=3498 pid=3634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.531000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:20:25.531000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.531000 audit[3634]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffe3639768 a2=28 a3=ffffe3639898 items=0 ppid=3498 pid=3634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.531000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:20:25.531000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.531000 audit[3634]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe3639748 a2=28 a3=ffffe3639878 items=0 ppid=3498 pid=3634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.531000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:20:25.533000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.533000 audit[3634]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe3639768 a2=28 a3=ffffe3639898 items=0 ppid=3498 pid=3634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.533000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:20:25.533000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.533000 audit[3634]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe3639738 a2=28 a3=ffffe3639868 items=0 ppid=3498 pid=3634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.533000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:20:25.533000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.533000 audit[3634]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffe36397b8 a2=28 a3=ffffe36398f8 items=0 ppid=3498 pid=3634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.533000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:20:25.534000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.534000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.534000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.534000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.534000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.534000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.534000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.534000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.534000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.534000 audit: BPF prog-id=166 op=LOAD May 15 10:20:25.534000 audit[3634]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffe36395d8 a2=40 a3=ffffe3639608 items=0 ppid=3498 pid=3634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.534000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:20:25.535000 audit: BPF prog-id=166 op=UNLOAD May 15 10:20:25.536000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.536000 audit[3634]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffe3639600 a2=50 a3=0 items=0 ppid=3498 pid=3634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.536000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:20:25.536000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.536000 audit[3634]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=ffffe3639600 a2=50 a3=0 items=0 ppid=3498 pid=3634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.536000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:20:25.537000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.537000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.537000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.537000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.537000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.537000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.537000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.537000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.537000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.537000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.537000 audit: BPF prog-id=167 op=LOAD May 15 10:20:25.537000 audit[3634]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffe3638d68 a2=94 a3=2 items=0 ppid=3498 pid=3634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.537000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:20:25.537000 audit: BPF prog-id=167 op=UNLOAD May 15 10:20:25.538000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.538000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.538000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.538000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.538000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.538000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.538000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.538000 audit[3634]: AVC avc: denied { perfmon } for pid=3634 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.538000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.538000 audit[3634]: AVC avc: denied { bpf } for pid=3634 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.538000 audit: BPF prog-id=168 op=LOAD May 15 10:20:25.538000 audit[3634]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffe3638ef8 a2=94 a3=30 items=0 ppid=3498 pid=3634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.538000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:20:25.542000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.542000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.542000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.542000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.542000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.542000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.542000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.542000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.542000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.542000 audit: BPF prog-id=169 op=LOAD May 15 10:20:25.542000 audit[3640]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc3762318 a2=98 a3=ffffc3762308 items=0 ppid=3498 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.542000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:20:25.542000 audit: BPF prog-id=169 op=UNLOAD May 15 10:20:25.542000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.542000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.542000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.542000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.542000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.542000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.542000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.542000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.542000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.542000 audit: BPF prog-id=170 op=LOAD May 15 10:20:25.542000 audit[3640]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc3761fa8 a2=74 a3=95 items=0 ppid=3498 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.542000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:20:25.542000 audit: BPF prog-id=170 op=UNLOAD May 15 10:20:25.542000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.542000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.542000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.542000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.542000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.542000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.542000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.542000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.542000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.542000 audit: BPF prog-id=171 op=LOAD May 15 10:20:25.542000 audit[3640]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc3762008 a2=94 a3=2 items=0 ppid=3498 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.542000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:20:25.542000 audit: BPF prog-id=171 op=UNLOAD May 15 10:20:25.631000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.631000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.631000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.631000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.631000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.631000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.631000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.631000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.631000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.631000 audit: BPF prog-id=172 op=LOAD May 15 10:20:25.631000 audit[3640]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc3761fc8 a2=40 a3=ffffc3761ff8 items=0 ppid=3498 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.631000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:20:25.631000 audit: BPF prog-id=172 op=UNLOAD May 15 10:20:25.631000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.631000 audit[3640]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffc37620e0 a2=50 a3=0 items=0 ppid=3498 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.631000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:20:25.637283 kubelet[1450]: E0515 10:20:25.637244 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:20:25.640000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.640000 audit[3640]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc3762038 a2=28 a3=ffffc3762168 items=0 ppid=3498 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.640000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:20:25.640000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.640000 audit[3640]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc3762068 a2=28 a3=ffffc3762198 items=0 ppid=3498 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.640000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:20:25.640000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.640000 audit[3640]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc3761f18 a2=28 a3=ffffc3762048 items=0 ppid=3498 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.640000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:20:25.640000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.640000 audit[3640]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc3762088 a2=28 a3=ffffc37621b8 items=0 ppid=3498 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.640000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:20:25.640000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.640000 audit[3640]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc3762068 a2=28 a3=ffffc3762198 items=0 ppid=3498 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.640000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:20:25.640000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.640000 audit[3640]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc3762058 a2=28 a3=ffffc3762188 items=0 ppid=3498 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.640000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:20:25.640000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.640000 audit[3640]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc3762088 a2=28 a3=ffffc37621b8 items=0 ppid=3498 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.640000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:20:25.640000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.640000 audit[3640]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc3762068 a2=28 a3=ffffc3762198 items=0 ppid=3498 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.640000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:20:25.640000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.640000 audit[3640]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc3762088 a2=28 a3=ffffc37621b8 items=0 ppid=3498 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.640000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:20:25.640000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.640000 audit[3640]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc3762058 a2=28 a3=ffffc3762188 items=0 ppid=3498 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.640000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:20:25.640000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.640000 audit[3640]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc37620d8 a2=28 a3=ffffc3762218 items=0 ppid=3498 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.640000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:20:25.640000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.640000 audit[3640]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffc3761e10 a2=50 a3=0 items=0 ppid=3498 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.640000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:20:25.640000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.640000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.640000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.640000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.640000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.640000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.640000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.640000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.640000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.640000 audit: BPF prog-id=173 op=LOAD May 15 10:20:25.640000 audit[3640]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffc3761e18 a2=94 a3=5 items=0 ppid=3498 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.640000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:20:25.640000 audit: BPF prog-id=173 op=UNLOAD May 15 10:20:25.640000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.640000 audit[3640]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffc3761f20 a2=50 a3=0 items=0 ppid=3498 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.640000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:20:25.640000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.640000 audit[3640]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffc3762068 a2=4 a3=3 items=0 ppid=3498 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.640000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:20:25.640000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.640000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.640000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.640000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.640000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.640000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.640000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.640000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.640000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.640000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.640000 audit[3640]: AVC avc: denied { confidentiality } for pid=3640 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:25.640000 audit[3640]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc3762048 a2=94 a3=6 items=0 ppid=3498 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.640000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:20:25.641000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.641000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.641000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.641000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.641000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.641000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.641000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.641000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.641000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.641000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.641000 audit[3640]: AVC avc: denied { confidentiality } for pid=3640 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:25.641000 audit[3640]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc3761818 a2=94 a3=83 items=0 ppid=3498 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.641000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:20:25.641000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.641000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.641000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.641000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.641000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.641000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.641000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.641000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.641000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.641000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.641000 audit[3640]: AVC avc: denied { confidentiality } for pid=3640 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:25.641000 audit[3640]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc3761818 a2=94 a3=83 items=0 ppid=3498 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.641000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:20:25.641000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.641000 audit[3640]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc3763258 a2=10 a3=ffffc3763348 items=0 ppid=3498 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.641000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:20:25.642000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.642000 audit[3640]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc3763118 a2=10 a3=ffffc3763208 items=0 ppid=3498 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.642000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:20:25.642000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.642000 audit[3640]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc3763088 a2=10 a3=ffffc3763208 items=0 ppid=3498 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.642000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:20:25.642000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:25.642000 audit[3640]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc3763088 a2=10 a3=ffffc3763208 items=0 ppid=3498 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:25.642000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:20:25.648000 audit: BPF prog-id=168 op=UNLOAD May 15 10:20:25.936993 kubelet[1450]: E0515 10:20:25.936794 1450 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:20:25.936993 kubelet[1450]: E0515 10:20:25.936856 1450 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:20:25.957915 systemd[1]: run-containerd-runc-k8s.io-2a6c76b5e9e997eb2942259fa179edeb0f44fa487662d44385b67f8fdc7e306c-runc.KL3g2u.mount: Deactivated successfully. May 15 10:20:26.198000 audit[3699]: NETFILTER_CFG table=filter:103 family=2 entries=8 op=nft_register_rule pid=3699 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:20:26.198000 audit[3699]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffd921fd60 a2=0 a3=1 items=0 ppid=1668 pid=3699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.198000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:20:26.210000 audit[3699]: NETFILTER_CFG table=nat:104 family=2 entries=54 op=nft_register_rule pid=3699 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:20:26.210000 audit[3699]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18564 a0=3 a1=ffffd921fd60 a2=0 a3=1 items=0 ppid=1668 pid=3699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.210000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:20:26.638309 kubelet[1450]: E0515 10:20:26.638268 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:20:26.696043 systemd[1]: Created slice kubepods-besteffort-pode42f898c_1c5f_479f_9227_10fe0c015c0c.slice. May 15 10:20:26.848221 kubelet[1450]: I0515 10:20:26.848119 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-db5b07fc-b1df-4f2d-9e33-6d4ea3df0521\" (UniqueName: \"kubernetes.io/nfs/e42f898c-1c5f-479f-9227-10fe0c015c0c-pvc-db5b07fc-b1df-4f2d-9e33-6d4ea3df0521\") pod \"test-pod-1\" (UID: \"e42f898c-1c5f-479f-9227-10fe0c015c0c\") " pod="default/test-pod-1" May 15 10:20:26.848221 kubelet[1450]: I0515 10:20:26.848160 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ng2hs\" (UniqueName: \"kubernetes.io/projected/e42f898c-1c5f-479f-9227-10fe0c015c0c-kube-api-access-ng2hs\") pod \"test-pod-1\" (UID: \"e42f898c-1c5f-479f-9227-10fe0c015c0c\") " pod="default/test-pod-1" May 15 10:20:26.938415 kubelet[1450]: E0515 10:20:26.938119 1450 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:20:26.962000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.962000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.962000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.966400 kernel: Failed to create system directory netfs May 15 10:20:26.966445 kernel: Failed to create system directory netfs May 15 10:20:26.966468 kernel: Failed to create system directory netfs May 15 10:20:26.966485 kernel: Failed to create system directory netfs May 15 10:20:26.962000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.962000 audit[3705]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaac8fd05e0 a1=12c14 a2=aaaac881e028 a3=aaaac8fc1010 items=0 ppid=62 pid=3705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.962000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 15 10:20:26.970000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.970000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.970000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.976558 kernel: Failed to create system directory fscache May 15 10:20:26.976598 kernel: Failed to create system directory fscache May 15 10:20:26.976612 kernel: Failed to create system directory fscache May 15 10:20:26.970000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.977331 kernel: Failed to create system directory fscache May 15 10:20:26.970000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.970000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.978660 kernel: Failed to create system directory fscache May 15 10:20:26.978687 kernel: Failed to create system directory fscache May 15 10:20:26.970000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.979378 kernel: Failed to create system directory fscache May 15 10:20:26.970000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.970000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.980670 kernel: Failed to create system directory fscache May 15 10:20:26.980690 kernel: Failed to create system directory fscache May 15 10:20:26.970000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.981311 kernel: Failed to create system directory fscache May 15 10:20:26.970000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.970000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.982520 kernel: Failed to create system directory fscache May 15 10:20:26.982541 kernel: Failed to create system directory fscache May 15 10:20:26.970000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.983215 kernel: Failed to create system directory fscache May 15 10:20:26.970000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.984415 kernel: Failed to create system directory fscache May 15 10:20:26.984435 kernel: FS-Cache: Loaded May 15 10:20:26.970000 audit[3705]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaac91e3210 a1=4c344 a2=aaaac881e028 a3=aaaac8fc1010 items=0 ppid=62 pid=3705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.970000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 15 10:20:27.007353 kernel: Failed to create system directory sunrpc May 15 10:20:27.007439 kernel: Failed to create system directory sunrpc May 15 10:20:27.008705 kernel: Failed to create system directory sunrpc May 15 10:20:27.008760 kernel: Failed to create system directory sunrpc May 15 10:20:27.009415 kernel: Failed to create system directory sunrpc May 15 10:20:27.010796 kernel: Failed to create system directory sunrpc May 15 10:20:27.010849 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.011781 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.012546 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.013287 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.014720 kernel: Failed to create system directory sunrpc May 15 10:20:27.014774 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.015480 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.016235 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.017662 kernel: Failed to create system directory sunrpc May 15 10:20:27.017709 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.018402 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.019214 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.020506 kernel: Failed to create system directory sunrpc May 15 10:20:27.020559 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.021280 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.022720 kernel: Failed to create system directory sunrpc May 15 10:20:27.022784 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.023490 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.024223 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.025679 kernel: Failed to create system directory sunrpc May 15 10:20:27.025727 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.026478 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.027276 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.028647 kernel: Failed to create system directory sunrpc May 15 10:20:27.028696 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.029415 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.030242 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.031602 kernel: Failed to create system directory sunrpc May 15 10:20:27.031649 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.032361 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.033792 kernel: Failed to create system directory sunrpc May 15 10:20:27.033839 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.034561 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.035311 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.036723 kernel: Failed to create system directory sunrpc May 15 10:20:27.036774 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.037523 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.038259 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.039705 kernel: Failed to create system directory sunrpc May 15 10:20:27.039755 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.040455 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.041272 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.042646 kernel: Failed to create system directory sunrpc May 15 10:20:27.042692 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.043404 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.044215 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.045583 kernel: Failed to create system directory sunrpc May 15 10:20:27.045644 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.046360 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.047779 kernel: Failed to create system directory sunrpc May 15 10:20:27.047826 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.048529 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.049255 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.050694 kernel: Failed to create system directory sunrpc May 15 10:20:27.050744 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.051465 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.052263 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.053603 kernel: Failed to create system directory sunrpc May 15 10:20:27.053649 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.054364 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.055789 kernel: Failed to create system directory sunrpc May 15 10:20:27.055837 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.056555 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.057371 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.058793 kernel: Failed to create system directory sunrpc May 15 10:20:27.058841 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.059561 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.060297 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.061736 kernel: Failed to create system directory sunrpc May 15 10:20:27.061795 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.062508 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.063290 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.064580 kernel: Failed to create system directory sunrpc May 15 10:20:27.064627 kernel: Failed to create system directory sunrpc May 15 10:20:27.065274 kernel: Failed to create system directory sunrpc May 15 10:20:27.066498 kernel: Failed to create system directory sunrpc May 15 10:20:27.066549 kernel: Failed to create system directory sunrpc May 15 10:20:27.067221 kernel: Failed to create system directory sunrpc May 15 10:20:27.068556 kernel: Failed to create system directory sunrpc May 15 10:20:27.068606 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.069513 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.070508 kernel: Failed to create system directory sunrpc May 15 10:20:27.070561 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.071744 kernel: Failed to create system directory sunrpc May 15 10:20:27.071777 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.072660 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.073568 kernel: Failed to create system directory sunrpc May 15 10:20:27.073601 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.074744 kernel: Failed to create system directory sunrpc May 15 10:20:27.074769 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.075345 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.076487 kernel: Failed to create system directory sunrpc May 15 10:20:27.076515 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.077657 kernel: Failed to create system directory sunrpc May 15 10:20:27.077684 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.079386 kernel: Failed to create system directory sunrpc May 15 10:20:27.079425 kernel: Failed to create system directory sunrpc May 15 10:20:27.079441 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.080499 kernel: Failed to create system directory sunrpc May 15 10:20:27.080531 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.081656 kernel: Failed to create system directory sunrpc May 15 10:20:27.081686 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.083384 kernel: Failed to create system directory sunrpc May 15 10:20:27.083409 kernel: Failed to create system directory sunrpc May 15 10:20:27.083430 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.084544 kernel: Failed to create system directory sunrpc May 15 10:20:27.084578 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.085720 kernel: Failed to create system directory sunrpc May 15 10:20:27.085751 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.087454 kernel: Failed to create system directory sunrpc May 15 10:20:27.087481 kernel: Failed to create system directory sunrpc May 15 10:20:27.087496 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.088612 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.089212 kernel: Failed to create system directory sunrpc May 15 10:20:27.089242 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.090364 kernel: Failed to create system directory sunrpc May 15 10:20:27.090393 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.091511 kernel: Failed to create system directory sunrpc May 15 10:20:27.091540 kernel: Failed to create system directory sunrpc May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:26.999000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.092669 kernel: Failed to create system directory sunrpc May 15 10:20:27.098442 kernel: RPC: Registered named UNIX socket transport module. May 15 10:20:27.098492 kernel: RPC: Registered udp transport module. May 15 10:20:27.098516 kernel: RPC: Registered tcp transport module. May 15 10:20:27.099683 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. May 15 10:20:26.999000 audit[3705]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaac922f560 a1=14a72c a2=aaaac881e028 a3=aaaac8fc1010 items=6 ppid=62 pid=3705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:26.999000 audit: CWD cwd="/" May 15 10:20:26.999000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:20:26.999000 audit: PATH item=1 name=(null) inode=20334 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:20:26.999000 audit: PATH item=2 name=(null) inode=20334 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:20:26.999000 audit: PATH item=3 name=(null) inode=20335 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:20:26.999000 audit: PATH item=4 name=(null) inode=20334 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:20:26.999000 audit: PATH item=5 name=(null) inode=20336 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:20:26.999000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.126517 kernel: Failed to create system directory nfs May 15 10:20:27.126559 kernel: Failed to create system directory nfs May 15 10:20:27.126574 kernel: Failed to create system directory nfs May 15 10:20:27.126586 kernel: Failed to create system directory nfs May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.127629 kernel: Failed to create system directory nfs May 15 10:20:27.127655 kernel: Failed to create system directory nfs May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.128735 kernel: Failed to create system directory nfs May 15 10:20:27.128762 kernel: Failed to create system directory nfs May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.130394 kernel: Failed to create system directory nfs May 15 10:20:27.130422 kernel: Failed to create system directory nfs May 15 10:20:27.130435 kernel: Failed to create system directory nfs May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.131495 kernel: Failed to create system directory nfs May 15 10:20:27.131525 kernel: Failed to create system directory nfs May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.132603 kernel: Failed to create system directory nfs May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.133781 kernel: Failed to create system directory nfs May 15 10:20:27.133807 kernel: Failed to create system directory nfs May 15 10:20:27.133834 kernel: Failed to create system directory nfs May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.135476 kernel: Failed to create system directory nfs May 15 10:20:27.135505 kernel: Failed to create system directory nfs May 15 10:20:27.135519 kernel: Failed to create system directory nfs May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.136622 kernel: Failed to create system directory nfs May 15 10:20:27.136657 kernel: Failed to create system directory nfs May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.137748 kernel: Failed to create system directory nfs May 15 10:20:27.137772 kernel: Failed to create system directory nfs May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.138298 kernel: Failed to create system directory nfs May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.139399 kernel: Failed to create system directory nfs May 15 10:20:27.139422 kernel: Failed to create system directory nfs May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.140498 kernel: Failed to create system directory nfs May 15 10:20:27.140532 kernel: Failed to create system directory nfs May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.141596 kernel: Failed to create system directory nfs May 15 10:20:27.141639 kernel: Failed to create system directory nfs May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.142702 kernel: Failed to create system directory nfs May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.143269 kernel: Failed to create system directory nfs May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.144372 kernel: Failed to create system directory nfs May 15 10:20:27.144394 kernel: Failed to create system directory nfs May 15 10:20:27.144407 kernel: Failed to create system directory nfs May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.145475 kernel: Failed to create system directory nfs May 15 10:20:27.145517 kernel: Failed to create system directory nfs May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.146637 kernel: Failed to create system directory nfs May 15 10:20:27.146662 kernel: Failed to create system directory nfs May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.147729 kernel: Failed to create system directory nfs May 15 10:20:27.147772 kernel: Failed to create system directory nfs May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.149370 kernel: Failed to create system directory nfs May 15 10:20:27.149407 kernel: Failed to create system directory nfs May 15 10:20:27.149421 kernel: Failed to create system directory nfs May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.150504 kernel: Failed to create system directory nfs May 15 10:20:27.150526 kernel: Failed to create system directory nfs May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.151608 kernel: Failed to create system directory nfs May 15 10:20:27.151641 kernel: Failed to create system directory nfs May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.152736 kernel: Failed to create system directory nfs May 15 10:20:27.152759 kernel: Failed to create system directory nfs May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.153285 kernel: Failed to create system directory nfs May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.154372 kernel: Failed to create system directory nfs May 15 10:20:27.154396 kernel: Failed to create system directory nfs May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.155474 kernel: Failed to create system directory nfs May 15 10:20:27.155497 kernel: Failed to create system directory nfs May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.156587 kernel: Failed to create system directory nfs May 15 10:20:27.156610 kernel: Failed to create system directory nfs May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.157692 kernel: Failed to create system directory nfs May 15 10:20:27.157724 kernel: Failed to create system directory nfs May 15 10:20:27.119000 audit[3705]: AVC avc: denied { confidentiality } for pid=3705 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.176226 kernel: FS-Cache: Netfs 'nfs' registered for caching May 15 10:20:27.119000 audit[3705]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaac93d89f0 a1=1162dc a2=aaaac881e028 a3=aaaac8fc1010 items=0 ppid=62 pid=3705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:27.119000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.209070 kernel: Failed to create system directory nfs4 May 15 10:20:27.209107 kernel: Failed to create system directory nfs4 May 15 10:20:27.209122 kernel: Failed to create system directory nfs4 May 15 10:20:27.209138 kernel: Failed to create system directory nfs4 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.211322 kernel: Failed to create system directory nfs4 May 15 10:20:27.211360 kernel: Failed to create system directory nfs4 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.213342 kernel: Failed to create system directory nfs4 May 15 10:20:27.213393 kernel: Failed to create system directory nfs4 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.215284 kernel: Failed to create system directory nfs4 May 15 10:20:27.215317 kernel: Failed to create system directory nfs4 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.216452 kernel: Failed to create system directory nfs4 May 15 10:20:27.216488 kernel: Failed to create system directory nfs4 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.217599 kernel: Failed to create system directory nfs4 May 15 10:20:27.217643 kernel: Failed to create system directory nfs4 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.218765 kernel: Failed to create system directory nfs4 May 15 10:20:27.218799 kernel: Failed to create system directory nfs4 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.220524 kernel: Failed to create system directory nfs4 May 15 10:20:27.220550 kernel: Failed to create system directory nfs4 May 15 10:20:27.220564 kernel: Failed to create system directory nfs4 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.221696 kernel: Failed to create system directory nfs4 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.222270 kernel: Failed to create system directory nfs4 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.223434 kernel: Failed to create system directory nfs4 May 15 10:20:27.223455 kernel: Failed to create system directory nfs4 May 15 10:20:27.223492 kernel: Failed to create system directory nfs4 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.224690 kernel: Failed to create system directory nfs4 May 15 10:20:27.224728 kernel: Failed to create system directory nfs4 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.226456 kernel: Failed to create system directory nfs4 May 15 10:20:27.226490 kernel: Failed to create system directory nfs4 May 15 10:20:27.226507 kernel: Failed to create system directory nfs4 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.227634 kernel: Failed to create system directory nfs4 May 15 10:20:27.227667 kernel: Failed to create system directory nfs4 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.229372 kernel: Failed to create system directory nfs4 May 15 10:20:27.229405 kernel: Failed to create system directory nfs4 May 15 10:20:27.229423 kernel: Failed to create system directory nfs4 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.230530 kernel: Failed to create system directory nfs4 May 15 10:20:27.230574 kernel: Failed to create system directory nfs4 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.231750 kernel: Failed to create system directory nfs4 May 15 10:20:27.231784 kernel: Failed to create system directory nfs4 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.233561 kernel: Failed to create system directory nfs4 May 15 10:20:27.233598 kernel: Failed to create system directory nfs4 May 15 10:20:27.233613 kernel: Failed to create system directory nfs4 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.234755 kernel: Failed to create system directory nfs4 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.235526 kernel: Failed to create system directory nfs4 May 15 10:20:27.235583 kernel: Failed to create system directory nfs4 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.236737 kernel: Failed to create system directory nfs4 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.237453 kernel: Failed to create system directory nfs4 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.238708 kernel: Failed to create system directory nfs4 May 15 10:20:27.238765 kernel: Failed to create system directory nfs4 May 15 10:20:27.238802 kernel: Failed to create system directory nfs4 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.240651 kernel: Failed to create system directory nfs4 May 15 10:20:27.240794 kernel: Failed to create system directory nfs4 May 15 10:20:27.240815 kernel: Failed to create system directory nfs4 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.242496 kernel: Failed to create system directory nfs4 May 15 10:20:27.242586 kernel: Failed to create system directory nfs4 May 15 10:20:27.242619 kernel: Failed to create system directory nfs4 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.243681 kernel: Failed to create system directory nfs4 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.244277 kernel: Failed to create system directory nfs4 May 15 10:20:27.244320 kernel: Failed to create system directory nfs4 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.245444 kernel: Failed to create system directory nfs4 May 15 10:20:27.245484 kernel: Failed to create system directory nfs4 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.246626 kernel: Failed to create system directory nfs4 May 15 10:20:27.246668 kernel: Failed to create system directory nfs4 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.248322 kernel: Failed to create system directory nfs4 May 15 10:20:27.248353 kernel: Failed to create system directory nfs4 May 15 10:20:27.248369 kernel: Failed to create system directory nfs4 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.249497 kernel: Failed to create system directory nfs4 May 15 10:20:27.249541 kernel: Failed to create system directory nfs4 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.250675 kernel: Failed to create system directory nfs4 May 15 10:20:27.250711 kernel: Failed to create system directory nfs4 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.252429 kernel: Failed to create system directory nfs4 May 15 10:20:27.252464 kernel: Failed to create system directory nfs4 May 15 10:20:27.252481 kernel: Failed to create system directory nfs4 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.253586 kernel: Failed to create system directory nfs4 May 15 10:20:27.253622 kernel: Failed to create system directory nfs4 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.254749 kernel: Failed to create system directory nfs4 May 15 10:20:27.254782 kernel: Failed to create system directory nfs4 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.256481 kernel: Failed to create system directory nfs4 May 15 10:20:27.256517 kernel: Failed to create system directory nfs4 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.257712 kernel: Failed to create system directory nfs4 May 15 10:20:27.257749 kernel: Failed to create system directory nfs4 May 15 10:20:27.257764 kernel: Failed to create system directory nfs4 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.259492 kernel: Failed to create system directory nfs4 May 15 10:20:27.259531 kernel: Failed to create system directory nfs4 May 15 10:20:27.259570 kernel: Failed to create system directory nfs4 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.260707 kernel: Failed to create system directory nfs4 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.261288 kernel: Failed to create system directory nfs4 May 15 10:20:27.261324 kernel: Failed to create system directory nfs4 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.262436 kernel: Failed to create system directory nfs4 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.263615 kernel: Failed to create system directory nfs4 May 15 10:20:27.263649 kernel: Failed to create system directory nfs4 May 15 10:20:27.263663 kernel: Failed to create system directory nfs4 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.265362 kernel: Failed to create system directory nfs4 May 15 10:20:27.265395 kernel: Failed to create system directory nfs4 May 15 10:20:27.265423 kernel: Failed to create system directory nfs4 May 15 10:20:27.198000 audit[3709]: AVC avc: denied { confidentiality } for pid=3709 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.367501 kernel: NFS: Registering the id_resolver key type May 15 10:20:27.367625 kernel: Key type id_resolver registered May 15 10:20:27.367662 kernel: Key type id_legacy registered May 15 10:20:27.198000 audit[3709]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffffb768a010 a1=19c694 a2=aaaabb33e028 a3=aaaaee1c4010 items=0 ppid=62 pid=3709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:27.198000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 May 15 10:20:27.376000 audit[3712]: AVC avc: denied { confidentiality } for pid=3712 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.380764 kernel: Failed to create system directory rpcgss May 15 10:20:27.380865 kernel: Failed to create system directory rpcgss May 15 10:20:27.380886 kernel: Failed to create system directory rpcgss May 15 10:20:27.376000 audit[3712]: AVC avc: denied { confidentiality } for pid=3712 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.376000 audit[3712]: AVC avc: denied { confidentiality } for pid=3712 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.376000 audit[3712]: AVC avc: denied { confidentiality } for pid=3712 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.376000 audit[3712]: AVC avc: denied { confidentiality } for pid=3712 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.382647 kernel: Failed to create system directory rpcgss May 15 10:20:27.382710 kernel: Failed to create system directory rpcgss May 15 10:20:27.382725 kernel: Failed to create system directory rpcgss May 15 10:20:27.376000 audit[3712]: AVC avc: denied { confidentiality } for pid=3712 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.376000 audit[3712]: AVC avc: denied { confidentiality } for pid=3712 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.376000 audit[3712]: AVC avc: denied { confidentiality } for pid=3712 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.384368 kernel: Failed to create system directory rpcgss May 15 10:20:27.384425 kernel: Failed to create system directory rpcgss May 15 10:20:27.384445 kernel: Failed to create system directory rpcgss May 15 10:20:27.376000 audit[3712]: AVC avc: denied { confidentiality } for pid=3712 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.376000 audit[3712]: AVC avc: denied { confidentiality } for pid=3712 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.385521 kernel: Failed to create system directory rpcgss May 15 10:20:27.385577 kernel: Failed to create system directory rpcgss May 15 10:20:27.376000 audit[3712]: AVC avc: denied { confidentiality } for pid=3712 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.376000 audit[3712]: AVC avc: denied { confidentiality } for pid=3712 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.386688 kernel: Failed to create system directory rpcgss May 15 10:20:27.386727 kernel: Failed to create system directory rpcgss May 15 10:20:27.376000 audit[3712]: AVC avc: denied { confidentiality } for pid=3712 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.376000 audit[3712]: AVC avc: denied { confidentiality } for pid=3712 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.376000 audit[3712]: AVC avc: denied { confidentiality } for pid=3712 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.388500 kernel: Failed to create system directory rpcgss May 15 10:20:27.388562 kernel: Failed to create system directory rpcgss May 15 10:20:27.388579 kernel: Failed to create system directory rpcgss May 15 10:20:27.376000 audit[3712]: AVC avc: denied { confidentiality } for pid=3712 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.376000 audit[3712]: AVC avc: denied { confidentiality } for pid=3712 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.389620 kernel: Failed to create system directory rpcgss May 15 10:20:27.389646 kernel: Failed to create system directory rpcgss May 15 10:20:27.376000 audit[3712]: AVC avc: denied { confidentiality } for pid=3712 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.376000 audit[3712]: AVC avc: denied { confidentiality } for pid=3712 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.376000 audit[3712]: AVC avc: denied { confidentiality } for pid=3712 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.391400 kernel: Failed to create system directory rpcgss May 15 10:20:27.391436 kernel: Failed to create system directory rpcgss May 15 10:20:27.391455 kernel: Failed to create system directory rpcgss May 15 10:20:27.376000 audit[3712]: AVC avc: denied { confidentiality } for pid=3712 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.376000 audit[3712]: AVC avc: denied { confidentiality } for pid=3712 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.392693 kernel: Failed to create system directory rpcgss May 15 10:20:27.392734 kernel: Failed to create system directory rpcgss May 15 10:20:27.376000 audit[3712]: AVC avc: denied { confidentiality } for pid=3712 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.376000 audit[3712]: AVC avc: denied { confidentiality } for pid=3712 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.376000 audit[3712]: AVC avc: denied { confidentiality } for pid=3712 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.394470 kernel: Failed to create system directory rpcgss May 15 10:20:27.394504 kernel: Failed to create system directory rpcgss May 15 10:20:27.394518 kernel: Failed to create system directory rpcgss May 15 10:20:27.376000 audit[3712]: AVC avc: denied { confidentiality } for pid=3712 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:20:27.376000 audit[3712]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffffa3a82010 a1=5ee7c a2=aaaae008e028 a3=aaaaf3fec010 items=0 ppid=62 pid=3712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:27.376000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 May 15 10:20:27.427514 nfsidmap[3718]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' May 15 10:20:27.430621 nfsidmap[3721]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' May 15 10:20:27.445000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2812 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 15 10:20:27.445000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2812 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 15 10:20:27.445000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2812 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 15 10:20:27.445000 audit[1279]: AVC avc: denied { watch_reads } for pid=1279 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2812 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 15 10:20:27.445000 audit[1279]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaaf2b12b20 a2=10 a3=0 items=0 ppid=1 pid=1279 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:27.445000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 15 10:20:27.445000 audit[1279]: AVC avc: denied { watch_reads } for pid=1279 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2812 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 15 10:20:27.445000 audit[1279]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaaf2b12b20 a2=10 a3=0 items=0 ppid=1 pid=1279 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:27.445000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 15 10:20:27.445000 audit[1279]: AVC avc: denied { watch_reads } for pid=1279 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2812 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 15 10:20:27.445000 audit[1279]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaaf2b12b20 a2=10 a3=0 items=0 ppid=1 pid=1279 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:27.445000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 15 10:20:27.600056 env[1212]: time="2025-05-15T10:20:27.600019613Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:e42f898c-1c5f-479f-9227-10fe0c015c0c,Namespace:default,Attempt:0,}" May 15 10:20:27.638578 kubelet[1450]: E0515 10:20:27.638531 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:20:27.777491 systemd-networkd[1041]: cali5ec59c6bf6e: Link UP May 15 10:20:27.779413 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 10:20:27.779490 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready May 15 10:20:27.779408 systemd-networkd[1041]: cali5ec59c6bf6e: Gained carrier May 15 10:20:27.789626 env[1212]: 2025-05-15 10:20:27.698 [INFO][3724] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.90-k8s-test--pod--1-eth0 default e42f898c-1c5f-479f-9227-10fe0c015c0c 1411 0 2025-05-15 10:20:13 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.90 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="dabcc223ee923f67f9dba37fa3af2a3c203a996f18e36a9e5cfe3f8fd8710579" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.90-k8s-test--pod--1-" May 15 10:20:27.789626 env[1212]: 2025-05-15 10:20:27.699 [INFO][3724] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="dabcc223ee923f67f9dba37fa3af2a3c203a996f18e36a9e5cfe3f8fd8710579" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.90-k8s-test--pod--1-eth0" May 15 10:20:27.789626 env[1212]: 2025-05-15 10:20:27.732 [INFO][3738] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="dabcc223ee923f67f9dba37fa3af2a3c203a996f18e36a9e5cfe3f8fd8710579" HandleID="k8s-pod-network.dabcc223ee923f67f9dba37fa3af2a3c203a996f18e36a9e5cfe3f8fd8710579" Workload="10.0.0.90-k8s-test--pod--1-eth0" May 15 10:20:27.789626 env[1212]: 2025-05-15 10:20:27.744 [INFO][3738] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="dabcc223ee923f67f9dba37fa3af2a3c203a996f18e36a9e5cfe3f8fd8710579" HandleID="k8s-pod-network.dabcc223ee923f67f9dba37fa3af2a3c203a996f18e36a9e5cfe3f8fd8710579" Workload="10.0.0.90-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400031d8a0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.90", "pod":"test-pod-1", "timestamp":"2025-05-15 10:20:27.732754969 +0000 UTC"}, Hostname:"10.0.0.90", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:20:27.789626 env[1212]: 2025-05-15 10:20:27.744 [INFO][3738] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:20:27.789626 env[1212]: 2025-05-15 10:20:27.744 [INFO][3738] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:20:27.789626 env[1212]: 2025-05-15 10:20:27.744 [INFO][3738] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.90' May 15 10:20:27.789626 env[1212]: 2025-05-15 10:20:27.746 [INFO][3738] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.dabcc223ee923f67f9dba37fa3af2a3c203a996f18e36a9e5cfe3f8fd8710579" host="10.0.0.90" May 15 10:20:27.789626 env[1212]: 2025-05-15 10:20:27.750 [INFO][3738] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.90" May 15 10:20:27.789626 env[1212]: 2025-05-15 10:20:27.755 [INFO][3738] ipam/ipam.go 489: Trying affinity for 192.168.37.64/26 host="10.0.0.90" May 15 10:20:27.789626 env[1212]: 2025-05-15 10:20:27.757 [INFO][3738] ipam/ipam.go 155: Attempting to load block cidr=192.168.37.64/26 host="10.0.0.90" May 15 10:20:27.789626 env[1212]: 2025-05-15 10:20:27.759 [INFO][3738] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.37.64/26 host="10.0.0.90" May 15 10:20:27.789626 env[1212]: 2025-05-15 10:20:27.759 [INFO][3738] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.37.64/26 handle="k8s-pod-network.dabcc223ee923f67f9dba37fa3af2a3c203a996f18e36a9e5cfe3f8fd8710579" host="10.0.0.90" May 15 10:20:27.789626 env[1212]: 2025-05-15 10:20:27.761 [INFO][3738] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.dabcc223ee923f67f9dba37fa3af2a3c203a996f18e36a9e5cfe3f8fd8710579 May 15 10:20:27.789626 env[1212]: 2025-05-15 10:20:27.768 [INFO][3738] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.37.64/26 handle="k8s-pod-network.dabcc223ee923f67f9dba37fa3af2a3c203a996f18e36a9e5cfe3f8fd8710579" host="10.0.0.90" May 15 10:20:27.789626 env[1212]: 2025-05-15 10:20:27.773 [INFO][3738] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.37.69/26] block=192.168.37.64/26 handle="k8s-pod-network.dabcc223ee923f67f9dba37fa3af2a3c203a996f18e36a9e5cfe3f8fd8710579" host="10.0.0.90" May 15 10:20:27.789626 env[1212]: 2025-05-15 10:20:27.773 [INFO][3738] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.37.69/26] handle="k8s-pod-network.dabcc223ee923f67f9dba37fa3af2a3c203a996f18e36a9e5cfe3f8fd8710579" host="10.0.0.90" May 15 10:20:27.789626 env[1212]: 2025-05-15 10:20:27.773 [INFO][3738] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:20:27.789626 env[1212]: 2025-05-15 10:20:27.773 [INFO][3738] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.37.69/26] IPv6=[] ContainerID="dabcc223ee923f67f9dba37fa3af2a3c203a996f18e36a9e5cfe3f8fd8710579" HandleID="k8s-pod-network.dabcc223ee923f67f9dba37fa3af2a3c203a996f18e36a9e5cfe3f8fd8710579" Workload="10.0.0.90-k8s-test--pod--1-eth0" May 15 10:20:27.789626 env[1212]: 2025-05-15 10:20:27.775 [INFO][3724] cni-plugin/k8s.go 386: Populated endpoint ContainerID="dabcc223ee923f67f9dba37fa3af2a3c203a996f18e36a9e5cfe3f8fd8710579" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.90-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.90-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"e42f898c-1c5f-479f-9227-10fe0c015c0c", ResourceVersion:"1411", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 20, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.90", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.37.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:20:27.790263 env[1212]: 2025-05-15 10:20:27.775 [INFO][3724] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.37.69/32] ContainerID="dabcc223ee923f67f9dba37fa3af2a3c203a996f18e36a9e5cfe3f8fd8710579" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.90-k8s-test--pod--1-eth0" May 15 10:20:27.790263 env[1212]: 2025-05-15 10:20:27.775 [INFO][3724] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="dabcc223ee923f67f9dba37fa3af2a3c203a996f18e36a9e5cfe3f8fd8710579" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.90-k8s-test--pod--1-eth0" May 15 10:20:27.790263 env[1212]: 2025-05-15 10:20:27.779 [INFO][3724] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="dabcc223ee923f67f9dba37fa3af2a3c203a996f18e36a9e5cfe3f8fd8710579" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.90-k8s-test--pod--1-eth0" May 15 10:20:27.790263 env[1212]: 2025-05-15 10:20:27.780 [INFO][3724] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="dabcc223ee923f67f9dba37fa3af2a3c203a996f18e36a9e5cfe3f8fd8710579" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.90-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.90-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"e42f898c-1c5f-479f-9227-10fe0c015c0c", ResourceVersion:"1411", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 20, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.90", ContainerID:"dabcc223ee923f67f9dba37fa3af2a3c203a996f18e36a9e5cfe3f8fd8710579", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.37.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"7e:10:c4:3f:0a:0c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:20:27.790263 env[1212]: 2025-05-15 10:20:27.787 [INFO][3724] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="dabcc223ee923f67f9dba37fa3af2a3c203a996f18e36a9e5cfe3f8fd8710579" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.90-k8s-test--pod--1-eth0" May 15 10:20:27.795000 audit[3758]: NETFILTER_CFG table=filter:105 family=2 entries=42 op=nft_register_chain pid=3758 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:20:27.797349 kernel: kauditd_printk_skb: 1105 callbacks suppressed May 15 10:20:27.797418 kernel: audit: type=1325 audit(1747304427.795:1006): table=filter:105 family=2 entries=42 op=nft_register_chain pid=3758 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:20:27.795000 audit[3758]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20588 a0=3 a1=ffffe8f65b20 a2=0 a3=ffffb696ffa8 items=0 ppid=3498 pid=3758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:27.803418 kernel: audit: type=1300 audit(1747304427.795:1006): arch=c00000b7 syscall=211 success=yes exit=20588 a0=3 a1=ffffe8f65b20 a2=0 a3=ffffb696ffa8 items=0 ppid=3498 pid=3758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:27.803492 kernel: audit: type=1327 audit(1747304427.795:1006): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:20:27.795000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:20:27.809461 env[1212]: time="2025-05-15T10:20:27.809235674Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:20:27.809461 env[1212]: time="2025-05-15T10:20:27.809287031Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:20:27.809461 env[1212]: time="2025-05-15T10:20:27.809297870Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:20:27.809767 env[1212]: time="2025-05-15T10:20:27.809734362Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dabcc223ee923f67f9dba37fa3af2a3c203a996f18e36a9e5cfe3f8fd8710579 pid=3770 runtime=io.containerd.runc.v2 May 15 10:20:27.827230 systemd[1]: Started cri-containerd-dabcc223ee923f67f9dba37fa3af2a3c203a996f18e36a9e5cfe3f8fd8710579.scope. May 15 10:20:27.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:27.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:27.849375 kernel: audit: type=1400 audit(1747304427.843:1007): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:27.849435 kernel: audit: type=1400 audit(1747304427.843:1008): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:27.849463 kernel: audit: type=1400 audit(1747304427.843:1009): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:27.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:27.851787 kernel: audit: type=1400 audit(1747304427.843:1010): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:27.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:27.854205 kernel: audit: type=1400 audit(1747304427.843:1011): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:27.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:27.857240 kernel: audit: type=1400 audit(1747304427.843:1012): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:27.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:27.857453 systemd-resolved[1155]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:20:27.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:27.862081 kernel: audit: type=1400 audit(1747304427.843:1013): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:27.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:27.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:27.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:27.845000 audit: BPF prog-id=174 op=LOAD May 15 10:20:27.846000 audit[3779]: AVC avc: denied { bpf } for pid=3779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:27.846000 audit[3779]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bfb38 a2=10 a3=0 items=0 ppid=3770 pid=3779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:27.846000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461626363323233656539323366363766396462613337666133616632 May 15 10:20:27.846000 audit[3779]: AVC avc: denied { perfmon } for pid=3779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:27.846000 audit[3779]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bf5a0 a2=3c a3=0 items=0 ppid=3770 pid=3779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:27.846000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461626363323233656539323366363766396462613337666133616632 May 15 10:20:27.846000 audit[3779]: AVC avc: denied { bpf } for pid=3779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:27.846000 audit[3779]: AVC avc: denied { bpf } for pid=3779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:27.846000 audit[3779]: AVC avc: denied { bpf } for pid=3779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:27.846000 audit[3779]: AVC avc: denied { perfmon } for pid=3779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:27.846000 audit[3779]: AVC avc: denied { perfmon } for pid=3779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:27.846000 audit[3779]: AVC avc: denied { perfmon } for pid=3779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:27.846000 audit[3779]: AVC avc: denied { perfmon } for pid=3779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:27.846000 audit[3779]: AVC avc: denied { perfmon } for pid=3779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:27.846000 audit[3779]: AVC avc: denied { bpf } for pid=3779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:27.846000 audit[3779]: AVC avc: denied { bpf } for pid=3779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:27.846000 audit: BPF prog-id=175 op=LOAD May 15 10:20:27.846000 audit[3779]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bf8e0 a2=78 a3=0 items=0 ppid=3770 pid=3779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:27.846000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461626363323233656539323366363766396462613337666133616632 May 15 10:20:27.848000 audit[3779]: AVC avc: denied { bpf } for pid=3779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:27.848000 audit[3779]: AVC avc: denied { bpf } for pid=3779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:27.848000 audit[3779]: AVC avc: denied { perfmon } for pid=3779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:27.848000 audit[3779]: AVC avc: denied { perfmon } for pid=3779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:27.848000 audit[3779]: AVC avc: denied { perfmon } for pid=3779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:27.848000 audit[3779]: AVC avc: denied { perfmon } for pid=3779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:27.848000 audit[3779]: AVC avc: denied { perfmon } for pid=3779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:27.848000 audit[3779]: AVC avc: denied { bpf } for pid=3779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:27.848000 audit[3779]: AVC avc: denied { bpf } for pid=3779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:27.848000 audit: BPF prog-id=176 op=LOAD May 15 10:20:27.848000 audit[3779]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bf670 a2=78 a3=0 items=0 ppid=3770 pid=3779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:27.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461626363323233656539323366363766396462613337666133616632 May 15 10:20:27.850000 audit: BPF prog-id=176 op=UNLOAD May 15 10:20:27.850000 audit: BPF prog-id=175 op=UNLOAD May 15 10:20:27.850000 audit[3779]: AVC avc: denied { bpf } for pid=3779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:27.850000 audit[3779]: AVC avc: denied { bpf } for pid=3779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:27.850000 audit[3779]: AVC avc: denied { bpf } for pid=3779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:27.850000 audit[3779]: AVC avc: denied { perfmon } for pid=3779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:27.850000 audit[3779]: AVC avc: denied { perfmon } for pid=3779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:27.850000 audit[3779]: AVC avc: denied { perfmon } for pid=3779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:27.850000 audit[3779]: AVC avc: denied { perfmon } for pid=3779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:27.850000 audit[3779]: AVC avc: denied { perfmon } for pid=3779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:27.850000 audit[3779]: AVC avc: denied { bpf } for pid=3779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:27.850000 audit[3779]: AVC avc: denied { bpf } for pid=3779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:27.850000 audit: BPF prog-id=177 op=LOAD May 15 10:20:27.850000 audit[3779]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bfb40 a2=78 a3=0 items=0 ppid=3770 pid=3779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:27.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461626363323233656539323366363766396462613337666133616632 May 15 10:20:27.878012 env[1212]: time="2025-05-15T10:20:27.877950601Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:e42f898c-1c5f-479f-9227-10fe0c015c0c,Namespace:default,Attempt:0,} returns sandbox id \"dabcc223ee923f67f9dba37fa3af2a3c203a996f18e36a9e5cfe3f8fd8710579\"" May 15 10:20:27.879313 env[1212]: time="2025-05-15T10:20:27.879269316Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 15 10:20:28.316447 env[1212]: time="2025-05-15T10:20:28.316393274Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:20:28.317854 env[1212]: time="2025-05-15T10:20:28.317825467Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:e8b1cb61bd96acc3ff3c695318c9cc691213d532eee3731d038af92816fcb5f4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:20:28.319602 env[1212]: time="2025-05-15T10:20:28.319569282Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:20:28.321845 env[1212]: time="2025-05-15T10:20:28.321813106Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:20:28.322553 env[1212]: time="2025-05-15T10:20:28.322526903Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:e8b1cb61bd96acc3ff3c695318c9cc691213d532eee3731d038af92816fcb5f4\"" May 15 10:20:28.325009 env[1212]: time="2025-05-15T10:20:28.324980034Z" level=info msg="CreateContainer within sandbox \"dabcc223ee923f67f9dba37fa3af2a3c203a996f18e36a9e5cfe3f8fd8710579\" for container &ContainerMetadata{Name:test,Attempt:0,}" May 15 10:20:28.334767 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount738979807.mount: Deactivated successfully. May 15 10:20:28.335644 env[1212]: time="2025-05-15T10:20:28.334806440Z" level=info msg="CreateContainer within sandbox \"dabcc223ee923f67f9dba37fa3af2a3c203a996f18e36a9e5cfe3f8fd8710579\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"b3ea0bc7e333f4728d68867cbd900a4403e3f93a86dc7898c81cf79d60d6359e\"" May 15 10:20:28.336227 env[1212]: time="2025-05-15T10:20:28.336140639Z" level=info msg="StartContainer for \"b3ea0bc7e333f4728d68867cbd900a4403e3f93a86dc7898c81cf79d60d6359e\"" May 15 10:20:28.353019 systemd[1]: Started cri-containerd-b3ea0bc7e333f4728d68867cbd900a4403e3f93a86dc7898c81cf79d60d6359e.scope. May 15 10:20:28.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:28.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:28.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:28.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:28.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:28.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:28.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:28.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:28.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:28.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:28.368000 audit: BPF prog-id=178 op=LOAD May 15 10:20:28.369000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:28.369000 audit[3812]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3770 pid=3812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:28.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233656130626337653333336634373238643638383637636264393030 May 15 10:20:28.369000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:28.369000 audit[3812]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3770 pid=3812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:28.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233656130626337653333336634373238643638383637636264393030 May 15 10:20:28.369000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:28.369000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:28.369000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:28.369000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:28.369000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:28.369000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:28.369000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:28.369000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:28.369000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:28.369000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:28.369000 audit: BPF prog-id=179 op=LOAD May 15 10:20:28.369000 audit[3812]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3770 pid=3812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:28.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233656130626337653333336634373238643638383637636264393030 May 15 10:20:28.370000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:28.370000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:28.370000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:28.370000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:28.370000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:28.370000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:28.370000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:28.370000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:28.370000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:28.370000 audit: BPF prog-id=180 op=LOAD May 15 10:20:28.370000 audit[3812]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3770 pid=3812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:28.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233656130626337653333336634373238643638383637636264393030 May 15 10:20:28.370000 audit: BPF prog-id=180 op=UNLOAD May 15 10:20:28.370000 audit: BPF prog-id=179 op=UNLOAD May 15 10:20:28.371000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:28.371000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:28.371000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:28.371000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:28.371000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:28.371000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:28.371000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:28.371000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:28.371000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:28.371000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:20:28.371000 audit: BPF prog-id=181 op=LOAD May 15 10:20:28.371000 audit[3812]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3770 pid=3812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:20:28.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233656130626337653333336634373238643638383637636264393030 May 15 10:20:28.383901 env[1212]: time="2025-05-15T10:20:28.383840474Z" level=info msg="StartContainer for \"b3ea0bc7e333f4728d68867cbd900a4403e3f93a86dc7898c81cf79d60d6359e\" returns successfully" May 15 10:20:28.638764 kubelet[1450]: E0515 10:20:28.638621 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:20:28.953667 kubelet[1450]: I0515 10:20:28.950952 1450 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=15.506226595 podStartE2EDuration="15.950935533s" podCreationTimestamp="2025-05-15 10:20:13 +0000 UTC" firstStartedPulling="2025-05-15 10:20:27.878991254 +0000 UTC m=+53.984493437" lastFinishedPulling="2025-05-15 10:20:28.323700152 +0000 UTC m=+54.429202375" observedRunningTime="2025-05-15 10:20:28.950232215 +0000 UTC m=+55.055734438" watchObservedRunningTime="2025-05-15 10:20:28.950935533 +0000 UTC m=+55.056437756" May 15 10:20:29.395336 systemd-networkd[1041]: cali5ec59c6bf6e: Gained IPv6LL May 15 10:20:29.639664 kubelet[1450]: E0515 10:20:29.639613 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 15 10:20:30.639918 kubelet[1450]: E0515 10:20:30.639863 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"