May 8 00:40:07.186820 kernel: Linux version 5.15.180-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Wed May 7 23:10:51 -00 2025 May 8 00:40:07.186843 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=a54efb5fced97d6fa50818abcad373184ba88ccc0f58664d2cd82270befba488 May 8 00:40:07.186855 kernel: BIOS-provided physical RAM map: May 8 00:40:07.186862 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable May 8 00:40:07.186868 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000007fffff] usable May 8 00:40:07.186875 kernel: BIOS-e820: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS May 8 00:40:07.186883 kernel: BIOS-e820: [mem 0x0000000000808000-0x000000000080afff] usable May 8 00:40:07.186890 kernel: BIOS-e820: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS May 8 00:40:07.186896 kernel: BIOS-e820: [mem 0x000000000080c000-0x000000000080ffff] usable May 8 00:40:07.186907 kernel: BIOS-e820: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS May 8 00:40:07.186914 kernel: BIOS-e820: [mem 0x0000000000900000-0x000000009c8eefff] usable May 8 00:40:07.186921 kernel: BIOS-e820: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved May 8 00:40:07.186928 kernel: BIOS-e820: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data May 8 00:40:07.186935 kernel: BIOS-e820: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS May 8 00:40:07.186943 kernel: BIOS-e820: [mem 0x000000009cbff000-0x000000009cf3ffff] usable May 8 00:40:07.186952 kernel: BIOS-e820: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved May 8 00:40:07.186965 kernel: BIOS-e820: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS May 8 00:40:07.186972 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved May 8 00:40:07.186979 kernel: NX (Execute Disable) protection: active May 8 00:40:07.186986 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable May 8 00:40:07.186994 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable May 8 00:40:07.187001 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable May 8 00:40:07.187008 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable May 8 00:40:07.187015 kernel: extended physical RAM map: May 8 00:40:07.187022 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable May 8 00:40:07.187031 kernel: reserve setup_data: [mem 0x0000000000100000-0x00000000007fffff] usable May 8 00:40:07.187038 kernel: reserve setup_data: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS May 8 00:40:07.187045 kernel: reserve setup_data: [mem 0x0000000000808000-0x000000000080afff] usable May 8 00:40:07.187052 kernel: reserve setup_data: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS May 8 00:40:07.187059 kernel: reserve setup_data: [mem 0x000000000080c000-0x000000000080ffff] usable May 8 00:40:07.187069 kernel: reserve setup_data: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS May 8 00:40:07.187077 kernel: reserve setup_data: [mem 0x0000000000900000-0x000000009b438017] usable May 8 00:40:07.187084 kernel: reserve setup_data: [mem 0x000000009b438018-0x000000009b474e57] usable May 8 00:40:07.187091 kernel: reserve setup_data: [mem 0x000000009b474e58-0x000000009b475017] usable May 8 00:40:07.187098 kernel: reserve setup_data: [mem 0x000000009b475018-0x000000009b47ec57] usable May 8 00:40:07.187105 kernel: reserve setup_data: [mem 0x000000009b47ec58-0x000000009c8eefff] usable May 8 00:40:07.187117 kernel: reserve setup_data: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved May 8 00:40:07.187124 kernel: reserve setup_data: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data May 8 00:40:07.187131 kernel: reserve setup_data: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS May 8 00:40:07.187139 kernel: reserve setup_data: [mem 0x000000009cbff000-0x000000009cf3ffff] usable May 8 00:40:07.187149 kernel: reserve setup_data: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved May 8 00:40:07.187157 kernel: reserve setup_data: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS May 8 00:40:07.187164 kernel: reserve setup_data: [mem 0x00000000b0000000-0x00000000bfffffff] reserved May 8 00:40:07.187173 kernel: efi: EFI v2.70 by EDK II May 8 00:40:07.187181 kernel: efi: SMBIOS=0x9c9ab000 ACPI=0x9cb7e000 ACPI 2.0=0x9cb7e014 MEMATTR=0x9b673018 RNG=0x9cb73018 May 8 00:40:07.187189 kernel: random: crng init done May 8 00:40:07.187196 kernel: SMBIOS 2.8 present. May 8 00:40:07.187204 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015 May 8 00:40:07.187212 kernel: Hypervisor detected: KVM May 8 00:40:07.187219 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 8 00:40:07.187227 kernel: kvm-clock: cpu 0, msr 5a198001, primary cpu clock May 8 00:40:07.187235 kernel: kvm-clock: using sched offset of 5848612164 cycles May 8 00:40:07.187247 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 8 00:40:07.187255 kernel: tsc: Detected 2794.748 MHz processor May 8 00:40:07.187332 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 8 00:40:07.187340 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 8 00:40:07.187348 kernel: last_pfn = 0x9cf40 max_arch_pfn = 0x400000000 May 8 00:40:07.187356 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 8 00:40:07.187364 kernel: Using GB pages for direct mapping May 8 00:40:07.187372 kernel: Secure boot disabled May 8 00:40:07.187379 kernel: ACPI: Early table checksum verification disabled May 8 00:40:07.187390 kernel: ACPI: RSDP 0x000000009CB7E014 000024 (v02 BOCHS ) May 8 00:40:07.187398 kernel: ACPI: XSDT 0x000000009CB7D0E8 000054 (v01 BOCHS BXPC 00000001 01000013) May 8 00:40:07.187406 kernel: ACPI: FACP 0x000000009CB79000 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:40:07.187414 kernel: ACPI: DSDT 0x000000009CB7A000 0021A8 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:40:07.187422 kernel: ACPI: FACS 0x000000009CBDD000 000040 May 8 00:40:07.187430 kernel: ACPI: APIC 0x000000009CB78000 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:40:07.187438 kernel: ACPI: HPET 0x000000009CB77000 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:40:07.187446 kernel: ACPI: MCFG 0x000000009CB76000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:40:07.187454 kernel: ACPI: WAET 0x000000009CB75000 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 8 00:40:07.187464 kernel: ACPI: BGRT 0x000000009CB74000 000038 (v01 INTEL EDK2 00000002 01000013) May 8 00:40:07.187472 kernel: ACPI: Reserving FACP table memory at [mem 0x9cb79000-0x9cb790f3] May 8 00:40:07.187480 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cb7a000-0x9cb7c1a7] May 8 00:40:07.187488 kernel: ACPI: Reserving FACS table memory at [mem 0x9cbdd000-0x9cbdd03f] May 8 00:40:07.187495 kernel: ACPI: Reserving APIC table memory at [mem 0x9cb78000-0x9cb7808f] May 8 00:40:07.187503 kernel: ACPI: Reserving HPET table memory at [mem 0x9cb77000-0x9cb77037] May 8 00:40:07.187514 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cb76000-0x9cb7603b] May 8 00:40:07.187522 kernel: ACPI: Reserving WAET table memory at [mem 0x9cb75000-0x9cb75027] May 8 00:40:07.187530 kernel: ACPI: Reserving BGRT table memory at [mem 0x9cb74000-0x9cb74037] May 8 00:40:07.187542 kernel: No NUMA configuration found May 8 00:40:07.187550 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cf3ffff] May 8 00:40:07.187558 kernel: NODE_DATA(0) allocated [mem 0x9cea6000-0x9ceabfff] May 8 00:40:07.187566 kernel: Zone ranges: May 8 00:40:07.187594 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 8 00:40:07.187603 kernel: DMA32 [mem 0x0000000001000000-0x000000009cf3ffff] May 8 00:40:07.187610 kernel: Normal empty May 8 00:40:07.187618 kernel: Movable zone start for each node May 8 00:40:07.187626 kernel: Early memory node ranges May 8 00:40:07.187636 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] May 8 00:40:07.187644 kernel: node 0: [mem 0x0000000000100000-0x00000000007fffff] May 8 00:40:07.187652 kernel: node 0: [mem 0x0000000000808000-0x000000000080afff] May 8 00:40:07.187659 kernel: node 0: [mem 0x000000000080c000-0x000000000080ffff] May 8 00:40:07.187667 kernel: node 0: [mem 0x0000000000900000-0x000000009c8eefff] May 8 00:40:07.187675 kernel: node 0: [mem 0x000000009cbff000-0x000000009cf3ffff] May 8 00:40:07.187692 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cf3ffff] May 8 00:40:07.187711 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 8 00:40:07.187729 kernel: On node 0, zone DMA: 96 pages in unavailable ranges May 8 00:40:07.187738 kernel: On node 0, zone DMA: 8 pages in unavailable ranges May 8 00:40:07.187748 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 8 00:40:07.187756 kernel: On node 0, zone DMA: 240 pages in unavailable ranges May 8 00:40:07.187764 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges May 8 00:40:07.187772 kernel: On node 0, zone DMA32: 12480 pages in unavailable ranges May 8 00:40:07.187780 kernel: ACPI: PM-Timer IO Port: 0x608 May 8 00:40:07.187788 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 8 00:40:07.187796 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 May 8 00:40:07.187804 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) May 8 00:40:07.187812 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 8 00:40:07.187821 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 8 00:40:07.187829 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 8 00:40:07.187837 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 8 00:40:07.187850 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 8 00:40:07.187858 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 May 8 00:40:07.187866 kernel: TSC deadline timer available May 8 00:40:07.187874 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs May 8 00:40:07.187882 kernel: kvm-guest: KVM setup pv remote TLB flush May 8 00:40:07.187889 kernel: kvm-guest: setup PV sched yield May 8 00:40:07.187899 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices May 8 00:40:07.187907 kernel: Booting paravirtualized kernel on KVM May 8 00:40:07.187921 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 8 00:40:07.187931 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 May 8 00:40:07.187939 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 May 8 00:40:07.187948 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 May 8 00:40:07.187956 kernel: pcpu-alloc: [0] 0 1 2 3 May 8 00:40:07.187967 kernel: kvm-guest: setup async PF for cpu 0 May 8 00:40:07.187975 kernel: kvm-guest: stealtime: cpu 0, msr 9b21c0c0 May 8 00:40:07.187983 kernel: kvm-guest: PV spinlocks enabled May 8 00:40:07.187991 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) May 8 00:40:07.188002 kernel: Built 1 zonelists, mobility grouping on. Total pages: 629759 May 8 00:40:07.188010 kernel: Policy zone: DMA32 May 8 00:40:07.188019 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=a54efb5fced97d6fa50818abcad373184ba88ccc0f58664d2cd82270befba488 May 8 00:40:07.188028 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 8 00:40:07.188036 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 8 00:40:07.188046 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 8 00:40:07.188054 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 8 00:40:07.188063 kernel: Memory: 2397432K/2567000K available (12294K kernel code, 2279K rwdata, 13724K rodata, 47464K init, 4116K bss, 169308K reserved, 0K cma-reserved) May 8 00:40:07.188072 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 May 8 00:40:07.188080 kernel: ftrace: allocating 34584 entries in 136 pages May 8 00:40:07.188088 kernel: ftrace: allocated 136 pages with 2 groups May 8 00:40:07.188096 kernel: rcu: Hierarchical RCU implementation. May 8 00:40:07.188105 kernel: rcu: RCU event tracing is enabled. May 8 00:40:07.188116 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. May 8 00:40:07.188124 kernel: Rude variant of Tasks RCU enabled. May 8 00:40:07.188132 kernel: Tracing variant of Tasks RCU enabled. May 8 00:40:07.188141 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 8 00:40:07.188149 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 May 8 00:40:07.188157 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 May 8 00:40:07.188166 kernel: Console: colour dummy device 80x25 May 8 00:40:07.188174 kernel: printk: console [ttyS0] enabled May 8 00:40:07.188182 kernel: ACPI: Core revision 20210730 May 8 00:40:07.188191 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns May 8 00:40:07.188200 kernel: APIC: Switch to symmetric I/O mode setup May 8 00:40:07.188209 kernel: x2apic enabled May 8 00:40:07.188217 kernel: Switched APIC routing to physical x2apic. May 8 00:40:07.188225 kernel: kvm-guest: setup PV IPIs May 8 00:40:07.188234 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 8 00:40:07.188242 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized May 8 00:40:07.188250 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) May 8 00:40:07.188259 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated May 8 00:40:07.188267 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 May 8 00:40:07.188285 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 May 8 00:40:07.188294 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 8 00:40:07.188302 kernel: Spectre V2 : Mitigation: Retpolines May 8 00:40:07.188311 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch May 8 00:40:07.188319 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT May 8 00:40:07.188327 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls May 8 00:40:07.188336 kernel: RETBleed: Mitigation: untrained return thunk May 8 00:40:07.188347 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier May 8 00:40:07.188357 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp May 8 00:40:07.188366 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 8 00:40:07.188376 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 8 00:40:07.188385 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 8 00:40:07.188393 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 8 00:40:07.188402 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. May 8 00:40:07.188410 kernel: Freeing SMP alternatives memory: 32K May 8 00:40:07.188418 kernel: pid_max: default: 32768 minimum: 301 May 8 00:40:07.188426 kernel: LSM: Security Framework initializing May 8 00:40:07.188436 kernel: SELinux: Initializing. May 8 00:40:07.188444 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 8 00:40:07.188453 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 8 00:40:07.188461 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) May 8 00:40:07.188469 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. May 8 00:40:07.188478 kernel: ... version: 0 May 8 00:40:07.188486 kernel: ... bit width: 48 May 8 00:40:07.188494 kernel: ... generic registers: 6 May 8 00:40:07.188502 kernel: ... value mask: 0000ffffffffffff May 8 00:40:07.188512 kernel: ... max period: 00007fffffffffff May 8 00:40:07.188520 kernel: ... fixed-purpose events: 0 May 8 00:40:07.188528 kernel: ... event mask: 000000000000003f May 8 00:40:07.188537 kernel: signal: max sigframe size: 1776 May 8 00:40:07.188545 kernel: rcu: Hierarchical SRCU implementation. May 8 00:40:07.188553 kernel: smp: Bringing up secondary CPUs ... May 8 00:40:07.188562 kernel: x86: Booting SMP configuration: May 8 00:40:07.188580 kernel: .... node #0, CPUs: #1 May 8 00:40:07.188588 kernel: kvm-clock: cpu 1, msr 5a198041, secondary cpu clock May 8 00:40:07.188597 kernel: kvm-guest: setup async PF for cpu 1 May 8 00:40:07.188618 kernel: kvm-guest: stealtime: cpu 1, msr 9b29c0c0 May 8 00:40:07.188626 kernel: #2 May 8 00:40:07.188634 kernel: kvm-clock: cpu 2, msr 5a198081, secondary cpu clock May 8 00:40:07.188642 kernel: kvm-guest: setup async PF for cpu 2 May 8 00:40:07.188651 kernel: kvm-guest: stealtime: cpu 2, msr 9b31c0c0 May 8 00:40:07.188659 kernel: #3 May 8 00:40:07.188667 kernel: kvm-clock: cpu 3, msr 5a1980c1, secondary cpu clock May 8 00:40:07.188675 kernel: kvm-guest: setup async PF for cpu 3 May 8 00:40:07.188683 kernel: kvm-guest: stealtime: cpu 3, msr 9b39c0c0 May 8 00:40:07.188696 kernel: smp: Brought up 1 node, 4 CPUs May 8 00:40:07.188705 kernel: smpboot: Max logical packages: 1 May 8 00:40:07.188713 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) May 8 00:40:07.188721 kernel: devtmpfs: initialized May 8 00:40:07.188729 kernel: x86/mm: Memory block size: 128MB May 8 00:40:07.188738 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00800000-0x00807fff] (32768 bytes) May 8 00:40:07.188746 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x0080b000-0x0080bfff] (4096 bytes) May 8 00:40:07.188754 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00810000-0x008fffff] (983040 bytes) May 8 00:40:07.188763 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cb7f000-0x9cbfefff] (524288 bytes) May 8 00:40:07.188773 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cf60000-0x9cffffff] (655360 bytes) May 8 00:40:07.188781 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 8 00:40:07.188790 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) May 8 00:40:07.188798 kernel: pinctrl core: initialized pinctrl subsystem May 8 00:40:07.188806 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 8 00:40:07.188814 kernel: audit: initializing netlink subsys (disabled) May 8 00:40:07.188823 kernel: audit: type=2000 audit(1746664806.567:1): state=initialized audit_enabled=0 res=1 May 8 00:40:07.188831 kernel: thermal_sys: Registered thermal governor 'step_wise' May 8 00:40:07.188839 kernel: thermal_sys: Registered thermal governor 'user_space' May 8 00:40:07.188850 kernel: cpuidle: using governor menu May 8 00:40:07.188858 kernel: ACPI: bus type PCI registered May 8 00:40:07.188866 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 8 00:40:07.188874 kernel: dca service started, version 1.12.1 May 8 00:40:07.188883 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) May 8 00:40:07.188891 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 May 8 00:40:07.188900 kernel: PCI: Using configuration type 1 for base access May 8 00:40:07.188908 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 8 00:40:07.188916 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 8 00:40:07.188927 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 8 00:40:07.188935 kernel: ACPI: Added _OSI(Module Device) May 8 00:40:07.188943 kernel: ACPI: Added _OSI(Processor Device) May 8 00:40:07.188951 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 8 00:40:07.188960 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 8 00:40:07.188968 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 8 00:40:07.188976 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 8 00:40:07.188984 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 8 00:40:07.188993 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 8 00:40:07.189002 kernel: ACPI: Interpreter enabled May 8 00:40:07.189011 kernel: ACPI: PM: (supports S0 S3 S5) May 8 00:40:07.189019 kernel: ACPI: Using IOAPIC for interrupt routing May 8 00:40:07.189027 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 8 00:40:07.189035 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F May 8 00:40:07.189044 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 8 00:40:07.189219 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 8 00:40:07.189320 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] May 8 00:40:07.189412 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] May 8 00:40:07.189424 kernel: PCI host bridge to bus 0000:00 May 8 00:40:07.189529 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 8 00:40:07.189641 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 8 00:40:07.189717 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 8 00:40:07.189792 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] May 8 00:40:07.189865 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] May 8 00:40:07.189947 kernel: pci_bus 0000:00: root bus resource [mem 0x800000000-0xfffffffff window] May 8 00:40:07.190022 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 8 00:40:07.190126 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 May 8 00:40:07.190230 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 May 8 00:40:07.190330 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xc0000000-0xc0ffffff pref] May 8 00:40:07.190417 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xc1044000-0xc1044fff] May 8 00:40:07.190516 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] May 8 00:40:07.190655 kernel: pci 0000:00:01.0: BAR 0: assigned to efifb May 8 00:40:07.190742 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 8 00:40:07.190843 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 May 8 00:40:07.190933 kernel: pci 0000:00:02.0: reg 0x10: [io 0x6100-0x611f] May 8 00:40:07.191019 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xc1043000-0xc1043fff] May 8 00:40:07.191106 kernel: pci 0000:00:02.0: reg 0x20: [mem 0x800000000-0x800003fff 64bit pref] May 8 00:40:07.191210 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 May 8 00:40:07.191306 kernel: pci 0000:00:03.0: reg 0x10: [io 0x6000-0x607f] May 8 00:40:07.191393 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc1042000-0xc1042fff] May 8 00:40:07.191476 kernel: pci 0000:00:03.0: reg 0x20: [mem 0x800004000-0x800007fff 64bit pref] May 8 00:40:07.191591 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 May 8 00:40:07.191680 kernel: pci 0000:00:04.0: reg 0x10: [io 0x60e0-0x60ff] May 8 00:40:07.191772 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc1041000-0xc1041fff] May 8 00:40:07.191857 kernel: pci 0000:00:04.0: reg 0x20: [mem 0x800008000-0x80000bfff 64bit pref] May 8 00:40:07.191942 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfffc0000-0xffffffff pref] May 8 00:40:07.192049 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 May 8 00:40:07.192137 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO May 8 00:40:07.192260 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 May 8 00:40:07.192417 kernel: pci 0000:00:1f.2: reg 0x20: [io 0x60c0-0x60df] May 8 00:40:07.192545 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xc1040000-0xc1040fff] May 8 00:40:07.192734 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 May 8 00:40:07.192827 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x6080-0x60bf] May 8 00:40:07.192839 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 8 00:40:07.192847 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 8 00:40:07.192856 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 8 00:40:07.192864 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 8 00:40:07.192873 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 May 8 00:40:07.192885 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 May 8 00:40:07.192893 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 May 8 00:40:07.192902 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 May 8 00:40:07.192910 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 May 8 00:40:07.192918 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 May 8 00:40:07.192927 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 May 8 00:40:07.192935 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 May 8 00:40:07.192943 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 May 8 00:40:07.192951 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 May 8 00:40:07.192961 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 May 8 00:40:07.192970 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 May 8 00:40:07.192978 kernel: iommu: Default domain type: Translated May 8 00:40:07.192986 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 8 00:40:07.193075 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device May 8 00:40:07.193337 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 8 00:40:07.193460 kernel: pci 0000:00:01.0: vgaarb: bridge control possible May 8 00:40:07.193472 kernel: vgaarb: loaded May 8 00:40:07.193480 kernel: pps_core: LinuxPPS API ver. 1 registered May 8 00:40:07.193493 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 8 00:40:07.193501 kernel: PTP clock support registered May 8 00:40:07.193508 kernel: Registered efivars operations May 8 00:40:07.193516 kernel: PCI: Using ACPI for IRQ routing May 8 00:40:07.193524 kernel: PCI: pci_cache_line_size set to 64 bytes May 8 00:40:07.193531 kernel: e820: reserve RAM buffer [mem 0x0080b000-0x008fffff] May 8 00:40:07.193538 kernel: e820: reserve RAM buffer [mem 0x00810000-0x008fffff] May 8 00:40:07.193546 kernel: e820: reserve RAM buffer [mem 0x9b438018-0x9bffffff] May 8 00:40:07.193552 kernel: e820: reserve RAM buffer [mem 0x9b475018-0x9bffffff] May 8 00:40:07.193561 kernel: e820: reserve RAM buffer [mem 0x9c8ef000-0x9fffffff] May 8 00:40:07.193568 kernel: e820: reserve RAM buffer [mem 0x9cf40000-0x9fffffff] May 8 00:40:07.193594 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 May 8 00:40:07.193604 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter May 8 00:40:07.193613 kernel: clocksource: Switched to clocksource kvm-clock May 8 00:40:07.193622 kernel: VFS: Disk quotas dquot_6.6.0 May 8 00:40:07.193632 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 8 00:40:07.193641 kernel: pnp: PnP ACPI init May 8 00:40:07.193753 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved May 8 00:40:07.193773 kernel: pnp: PnP ACPI: found 6 devices May 8 00:40:07.193783 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 8 00:40:07.193793 kernel: NET: Registered PF_INET protocol family May 8 00:40:07.193802 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 8 00:40:07.193812 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 8 00:40:07.193819 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 8 00:40:07.193826 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 8 00:40:07.193833 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 8 00:40:07.193847 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 8 00:40:07.193854 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 8 00:40:07.193861 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 8 00:40:07.193869 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 8 00:40:07.193876 kernel: NET: Registered PF_XDP protocol family May 8 00:40:07.193977 kernel: pci 0000:00:04.0: can't claim BAR 6 [mem 0xfffc0000-0xffffffff pref]: no compatible bridge window May 8 00:40:07.194061 kernel: pci 0000:00:04.0: BAR 6: assigned [mem 0x9d000000-0x9d03ffff pref] May 8 00:40:07.194148 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 8 00:40:07.194231 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 8 00:40:07.194316 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 8 00:40:07.194400 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] May 8 00:40:07.194467 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] May 8 00:40:07.194551 kernel: pci_bus 0000:00: resource 9 [mem 0x800000000-0xfffffffff window] May 8 00:40:07.194562 kernel: PCI: CLS 0 bytes, default 64 May 8 00:40:07.194570 kernel: Initialise system trusted keyrings May 8 00:40:07.194604 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 8 00:40:07.194614 kernel: Key type asymmetric registered May 8 00:40:07.194622 kernel: Asymmetric key parser 'x509' registered May 8 00:40:07.194629 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 8 00:40:07.194648 kernel: io scheduler mq-deadline registered May 8 00:40:07.194665 kernel: io scheduler kyber registered May 8 00:40:07.194675 kernel: io scheduler bfq registered May 8 00:40:07.194685 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 8 00:40:07.194695 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 May 8 00:40:07.194708 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 May 8 00:40:07.194718 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 May 8 00:40:07.194725 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 8 00:40:07.194733 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 8 00:40:07.194741 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 8 00:40:07.194748 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 8 00:40:07.194756 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 8 00:40:07.194865 kernel: rtc_cmos 00:04: RTC can wake from S4 May 8 00:40:07.194881 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 8 00:40:07.194955 kernel: rtc_cmos 00:04: registered as rtc0 May 8 00:40:07.195027 kernel: rtc_cmos 00:04: setting system clock to 2025-05-08T00:40:06 UTC (1746664806) May 8 00:40:07.195096 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs May 8 00:40:07.195105 kernel: efifb: probing for efifb May 8 00:40:07.195113 kernel: efifb: framebuffer at 0xc0000000, using 4000k, total 4000k May 8 00:40:07.195121 kernel: efifb: mode is 1280x800x32, linelength=5120, pages=1 May 8 00:40:07.195130 kernel: efifb: scrolling: redraw May 8 00:40:07.195140 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 May 8 00:40:07.195149 kernel: Console: switching to colour frame buffer device 160x50 May 8 00:40:07.195161 kernel: fb0: EFI VGA frame buffer device May 8 00:40:07.195171 kernel: pstore: Registered efi as persistent store backend May 8 00:40:07.195181 kernel: NET: Registered PF_INET6 protocol family May 8 00:40:07.195199 kernel: Segment Routing with IPv6 May 8 00:40:07.195219 kernel: In-situ OAM (IOAM) with IPv6 May 8 00:40:07.195230 kernel: NET: Registered PF_PACKET protocol family May 8 00:40:07.195245 kernel: Key type dns_resolver registered May 8 00:40:07.195252 kernel: IPI shorthand broadcast: enabled May 8 00:40:07.195260 kernel: sched_clock: Marking stable (524002627, 142331115)->(779889369, -113555627) May 8 00:40:07.195268 kernel: registered taskstats version 1 May 8 00:40:07.195275 kernel: Loading compiled-in X.509 certificates May 8 00:40:07.195294 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.180-flatcar: c9ff13353458e6fa2786638fdd3dcad841d1075c' May 8 00:40:07.195301 kernel: Key type .fscrypt registered May 8 00:40:07.195309 kernel: Key type fscrypt-provisioning registered May 8 00:40:07.195316 kernel: pstore: Using crash dump compression: deflate May 8 00:40:07.195326 kernel: ima: No TPM chip found, activating TPM-bypass! May 8 00:40:07.195333 kernel: ima: Allocated hash algorithm: sha1 May 8 00:40:07.195341 kernel: ima: No architecture policies found May 8 00:40:07.195349 kernel: clk: Disabling unused clocks May 8 00:40:07.195356 kernel: Freeing unused kernel image (initmem) memory: 47464K May 8 00:40:07.195364 kernel: Write protecting the kernel read-only data: 28672k May 8 00:40:07.195371 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 8 00:40:07.195379 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 8 00:40:07.195386 kernel: Run /init as init process May 8 00:40:07.195398 kernel: with arguments: May 8 00:40:07.195406 kernel: /init May 8 00:40:07.195413 kernel: with environment: May 8 00:40:07.195420 kernel: HOME=/ May 8 00:40:07.195428 kernel: TERM=linux May 8 00:40:07.195435 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 8 00:40:07.195446 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 8 00:40:07.195456 systemd[1]: Detected virtualization kvm. May 8 00:40:07.195466 systemd[1]: Detected architecture x86-64. May 8 00:40:07.195474 systemd[1]: Running in initrd. May 8 00:40:07.195481 systemd[1]: No hostname configured, using default hostname. May 8 00:40:07.195489 systemd[1]: Hostname set to . May 8 00:40:07.195497 systemd[1]: Initializing machine ID from VM UUID. May 8 00:40:07.195505 systemd[1]: Queued start job for default target initrd.target. May 8 00:40:07.195513 systemd[1]: Started systemd-ask-password-console.path. May 8 00:40:07.195521 systemd[1]: Reached target cryptsetup.target. May 8 00:40:07.195530 systemd[1]: Reached target paths.target. May 8 00:40:07.195538 systemd[1]: Reached target slices.target. May 8 00:40:07.195545 systemd[1]: Reached target swap.target. May 8 00:40:07.195553 systemd[1]: Reached target timers.target. May 8 00:40:07.195562 systemd[1]: Listening on iscsid.socket. May 8 00:40:07.195569 systemd[1]: Listening on iscsiuio.socket. May 8 00:40:07.195592 systemd[1]: Listening on systemd-journald-audit.socket. May 8 00:40:07.195603 systemd[1]: Listening on systemd-journald-dev-log.socket. May 8 00:40:07.195611 systemd[1]: Listening on systemd-journald.socket. May 8 00:40:07.195621 systemd[1]: Listening on systemd-networkd.socket. May 8 00:40:07.195631 systemd[1]: Listening on systemd-udevd-control.socket. May 8 00:40:07.195642 systemd[1]: Listening on systemd-udevd-kernel.socket. May 8 00:40:07.195652 systemd[1]: Reached target sockets.target. May 8 00:40:07.195663 systemd[1]: Starting kmod-static-nodes.service... May 8 00:40:07.195673 systemd[1]: Finished network-cleanup.service. May 8 00:40:07.195684 systemd[1]: Starting systemd-fsck-usr.service... May 8 00:40:07.195695 systemd[1]: Starting systemd-journald.service... May 8 00:40:07.195703 systemd[1]: Starting systemd-modules-load.service... May 8 00:40:07.195711 systemd[1]: Starting systemd-resolved.service... May 8 00:40:07.195718 systemd[1]: Starting systemd-vconsole-setup.service... May 8 00:40:07.195726 systemd[1]: Finished kmod-static-nodes.service. May 8 00:40:07.195734 systemd[1]: Finished systemd-fsck-usr.service. May 8 00:40:07.195742 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 8 00:40:07.195750 systemd[1]: Finished systemd-vconsole-setup.service. May 8 00:40:07.195759 kernel: audit: type=1130 audit(1746664807.194:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:07.195772 systemd-journald[197]: Journal started May 8 00:40:07.195828 systemd-journald[197]: Runtime Journal (/run/log/journal/e074bcfe6f114badaf6e989a6eb04d8f) is 6.0M, max 48.4M, 42.4M free. May 8 00:40:07.194000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:07.192677 systemd-modules-load[198]: Inserted module 'overlay' May 8 00:40:07.199809 systemd[1]: Started systemd-journald.service. May 8 00:40:07.200000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:07.204269 systemd[1]: Starting dracut-cmdline-ask.service... May 8 00:40:07.206107 kernel: audit: type=1130 audit(1746664807.200:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:07.211365 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 8 00:40:07.211000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:07.217230 systemd-resolved[199]: Positive Trust Anchors: May 8 00:40:07.218199 kernel: audit: type=1130 audit(1746664807.211:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:07.217245 systemd-resolved[199]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 8 00:40:07.217284 systemd-resolved[199]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 8 00:40:07.220058 systemd-resolved[199]: Defaulting to hostname 'linux'. May 8 00:40:07.232466 kernel: audit: type=1130 audit(1746664807.225:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:07.225000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:07.220912 systemd[1]: Started systemd-resolved.service. May 8 00:40:07.225697 systemd[1]: Reached target nss-lookup.target. May 8 00:40:07.239150 kernel: audit: type=1130 audit(1746664807.231:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:07.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:07.230987 systemd[1]: Finished dracut-cmdline-ask.service. May 8 00:40:07.238076 systemd[1]: Starting dracut-cmdline.service... May 8 00:40:07.251466 dracut-cmdline[214]: dracut-dracut-053 May 8 00:40:07.254621 dracut-cmdline[214]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=a54efb5fced97d6fa50818abcad373184ba88ccc0f58664d2cd82270befba488 May 8 00:40:07.260908 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 8 00:40:07.261961 systemd-modules-load[198]: Inserted module 'br_netfilter' May 8 00:40:07.263068 kernel: Bridge firewalling registered May 8 00:40:07.280606 kernel: SCSI subsystem initialized May 8 00:40:07.292805 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 8 00:40:07.292858 kernel: device-mapper: uevent: version 1.0.3 May 8 00:40:07.294308 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 8 00:40:07.297590 systemd-modules-load[198]: Inserted module 'dm_multipath' May 8 00:40:07.300599 systemd[1]: Finished systemd-modules-load.service. May 8 00:40:07.301000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:07.303205 systemd[1]: Starting systemd-sysctl.service... May 8 00:40:07.307235 kernel: audit: type=1130 audit(1746664807.301:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:07.311333 systemd[1]: Finished systemd-sysctl.service. May 8 00:40:07.315922 kernel: audit: type=1130 audit(1746664807.311:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:07.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:07.330611 kernel: Loading iSCSI transport class v2.0-870. May 8 00:40:07.347632 kernel: iscsi: registered transport (tcp) May 8 00:40:07.370078 kernel: iscsi: registered transport (qla4xxx) May 8 00:40:07.370175 kernel: QLogic iSCSI HBA Driver May 8 00:40:07.428205 systemd[1]: Finished dracut-cmdline.service. May 8 00:40:07.429000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:07.430935 systemd[1]: Starting dracut-pre-udev.service... May 8 00:40:07.434471 kernel: audit: type=1130 audit(1746664807.429:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:07.481618 kernel: raid6: avx2x4 gen() 29311 MB/s May 8 00:40:07.498618 kernel: raid6: avx2x4 xor() 6885 MB/s May 8 00:40:07.515619 kernel: raid6: avx2x2 gen() 27914 MB/s May 8 00:40:07.532656 kernel: raid6: avx2x2 xor() 16510 MB/s May 8 00:40:07.549662 kernel: raid6: avx2x1 gen() 24043 MB/s May 8 00:40:07.566644 kernel: raid6: avx2x1 xor() 14019 MB/s May 8 00:40:07.583630 kernel: raid6: sse2x4 gen() 9959 MB/s May 8 00:40:07.600623 kernel: raid6: sse2x4 xor() 6800 MB/s May 8 00:40:07.617633 kernel: raid6: sse2x2 gen() 14412 MB/s May 8 00:40:07.634629 kernel: raid6: sse2x2 xor() 8896 MB/s May 8 00:40:07.651615 kernel: raid6: sse2x1 gen() 11099 MB/s May 8 00:40:07.669042 kernel: raid6: sse2x1 xor() 7035 MB/s May 8 00:40:07.669119 kernel: raid6: using algorithm avx2x4 gen() 29311 MB/s May 8 00:40:07.669129 kernel: raid6: .... xor() 6885 MB/s, rmw enabled May 8 00:40:07.669715 kernel: raid6: using avx2x2 recovery algorithm May 8 00:40:07.722609 kernel: xor: automatically using best checksumming function avx May 8 00:40:07.820613 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 8 00:40:07.829366 systemd[1]: Finished dracut-pre-udev.service. May 8 00:40:07.833956 kernel: audit: type=1130 audit(1746664807.829:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:07.829000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:07.833000 audit: BPF prog-id=7 op=LOAD May 8 00:40:07.833000 audit: BPF prog-id=8 op=LOAD May 8 00:40:07.834272 systemd[1]: Starting systemd-udevd.service... May 8 00:40:07.847505 systemd-udevd[402]: Using default interface naming scheme 'v252'. May 8 00:40:07.851536 systemd[1]: Started systemd-udevd.service. May 8 00:40:07.851000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:07.853898 systemd[1]: Starting dracut-pre-trigger.service... May 8 00:40:07.864367 dracut-pre-trigger[410]: rd.md=0: removing MD RAID activation May 8 00:40:07.891327 systemd[1]: Finished dracut-pre-trigger.service. May 8 00:40:07.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:07.918403 systemd[1]: Starting systemd-udev-trigger.service... May 8 00:40:07.958071 systemd[1]: Finished systemd-udev-trigger.service. May 8 00:40:07.959000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:07.996697 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) May 8 00:40:08.019941 kernel: cryptd: max_cpu_qlen set to 1000 May 8 00:40:08.019973 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 8 00:40:08.019987 kernel: GPT:9289727 != 19775487 May 8 00:40:08.019999 kernel: GPT:Alternate GPT header not at the end of the disk. May 8 00:40:08.020023 kernel: GPT:9289727 != 19775487 May 8 00:40:08.020035 kernel: GPT: Use GNU Parted to correct GPT errors. May 8 00:40:08.020046 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 8 00:40:08.020058 kernel: AVX2 version of gcm_enc/dec engaged. May 8 00:40:08.020070 kernel: libata version 3.00 loaded. May 8 00:40:08.021590 kernel: AES CTR mode by8 optimization enabled May 8 00:40:08.031604 kernel: ahci 0000:00:1f.2: version 3.0 May 8 00:40:08.107646 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 May 8 00:40:08.107671 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode May 8 00:40:08.107794 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only May 8 00:40:08.107881 kernel: scsi host0: ahci May 8 00:40:08.107993 kernel: scsi host1: ahci May 8 00:40:08.108085 kernel: scsi host2: ahci May 8 00:40:08.108174 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (443) May 8 00:40:08.108184 kernel: scsi host3: ahci May 8 00:40:08.108286 kernel: scsi host4: ahci May 8 00:40:08.108402 kernel: scsi host5: ahci May 8 00:40:08.108492 kernel: ata1: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040100 irq 34 May 8 00:40:08.108502 kernel: ata2: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040180 irq 34 May 8 00:40:08.108511 kernel: ata3: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040200 irq 34 May 8 00:40:08.108519 kernel: ata4: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040280 irq 34 May 8 00:40:08.108528 kernel: ata5: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040300 irq 34 May 8 00:40:08.108537 kernel: ata6: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040380 irq 34 May 8 00:40:08.048103 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 8 00:40:08.091139 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 8 00:40:08.102065 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 8 00:40:08.111910 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 8 00:40:08.118591 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 8 00:40:08.120384 systemd[1]: Starting disk-uuid.service... May 8 00:40:08.265377 disk-uuid[538]: Primary Header is updated. May 8 00:40:08.265377 disk-uuid[538]: Secondary Entries is updated. May 8 00:40:08.265377 disk-uuid[538]: Secondary Header is updated. May 8 00:40:08.270612 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 8 00:40:08.273606 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 8 00:40:08.277604 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 8 00:40:08.436599 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) May 8 00:40:08.436697 kernel: ata4: SATA link down (SStatus 0 SControl 300) May 8 00:40:08.436711 kernel: ata5: SATA link down (SStatus 0 SControl 300) May 8 00:40:08.438624 kernel: ata1: SATA link down (SStatus 0 SControl 300) May 8 00:40:08.439602 kernel: ata6: SATA link down (SStatus 0 SControl 300) May 8 00:40:08.439629 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 May 8 00:40:08.441131 kernel: ata3.00: applying bridge limits May 8 00:40:08.441603 kernel: ata2: SATA link down (SStatus 0 SControl 300) May 8 00:40:08.442614 kernel: ata3.00: configured for UDMA/100 May 8 00:40:08.443602 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 May 8 00:40:08.473618 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray May 8 00:40:08.491504 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 May 8 00:40:08.491521 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 May 8 00:40:09.375610 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 8 00:40:09.375677 disk-uuid[539]: The operation has completed successfully. May 8 00:40:09.399044 systemd[1]: disk-uuid.service: Deactivated successfully. May 8 00:40:09.439000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:09.439000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:09.399126 systemd[1]: Finished disk-uuid.service. May 8 00:40:09.444152 systemd[1]: Starting verity-setup.service... May 8 00:40:09.458603 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" May 8 00:40:09.481933 systemd[1]: Found device dev-mapper-usr.device. May 8 00:40:09.535923 systemd[1]: Mounting sysusr-usr.mount... May 8 00:40:09.539170 systemd[1]: Finished verity-setup.service. May 8 00:40:09.539000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:09.609609 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 8 00:40:09.610116 systemd[1]: Mounted sysusr-usr.mount. May 8 00:40:09.611002 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 8 00:40:09.611800 systemd[1]: Starting ignition-setup.service... May 8 00:40:09.614267 systemd[1]: Starting parse-ip-for-networkd.service... May 8 00:40:09.620922 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 8 00:40:09.620951 kernel: BTRFS info (device vda6): using free space tree May 8 00:40:09.620961 kernel: BTRFS info (device vda6): has skinny extents May 8 00:40:09.675062 systemd[1]: mnt-oem.mount: Deactivated successfully. May 8 00:40:09.722548 systemd[1]: Finished parse-ip-for-networkd.service. May 8 00:40:09.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:09.724000 audit: BPF prog-id=9 op=LOAD May 8 00:40:09.725568 systemd[1]: Starting systemd-networkd.service... May 8 00:40:09.746786 systemd-networkd[711]: lo: Link UP May 8 00:40:09.746797 systemd-networkd[711]: lo: Gained carrier May 8 00:40:09.747267 systemd-networkd[711]: Enumeration completed May 8 00:40:09.747491 systemd-networkd[711]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 8 00:40:09.748370 systemd[1]: Started systemd-networkd.service. May 8 00:40:09.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:09.748646 systemd-networkd[711]: eth0: Link UP May 8 00:40:09.748649 systemd-networkd[711]: eth0: Gained carrier May 8 00:40:09.753547 systemd[1]: Reached target network.target. May 8 00:40:09.757740 systemd[1]: Starting iscsiuio.service... May 8 00:40:09.800559 systemd[1]: Started iscsiuio.service. May 8 00:40:09.801766 systemd-networkd[711]: eth0: DHCPv4 address 10.0.0.33/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 8 00:40:09.801000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:09.804260 systemd[1]: Starting iscsid.service... May 8 00:40:09.808194 iscsid[716]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 8 00:40:09.808194 iscsid[716]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 8 00:40:09.808194 iscsid[716]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 8 00:40:09.808194 iscsid[716]: If using hardware iscsi like qla4xxx this message can be ignored. May 8 00:40:09.808194 iscsid[716]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 8 00:40:09.829524 iscsid[716]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 8 00:40:09.828660 systemd[1]: Started iscsid.service. May 8 00:40:09.833000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:09.835360 systemd[1]: Starting dracut-initqueue.service... May 8 00:40:09.845904 systemd[1]: Finished dracut-initqueue.service. May 8 00:40:09.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:09.847639 systemd[1]: Reached target remote-fs-pre.target. May 8 00:40:09.849279 systemd[1]: Reached target remote-cryptsetup.target. May 8 00:40:09.851061 systemd[1]: Reached target remote-fs.target. May 8 00:40:09.853249 systemd[1]: Starting dracut-pre-mount.service... May 8 00:40:09.861020 systemd[1]: Finished dracut-pre-mount.service. May 8 00:40:09.862000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:09.883924 systemd[1]: Finished ignition-setup.service. May 8 00:40:09.887000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:09.888169 systemd[1]: Starting ignition-fetch-offline.service... May 8 00:40:09.965336 ignition[731]: Ignition 2.14.0 May 8 00:40:09.965349 ignition[731]: Stage: fetch-offline May 8 00:40:09.965431 ignition[731]: no configs at "/usr/lib/ignition/base.d" May 8 00:40:09.965442 ignition[731]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:40:09.965590 ignition[731]: parsed url from cmdline: "" May 8 00:40:09.965595 ignition[731]: no config URL provided May 8 00:40:09.965601 ignition[731]: reading system config file "/usr/lib/ignition/user.ign" May 8 00:40:09.965610 ignition[731]: no config at "/usr/lib/ignition/user.ign" May 8 00:40:09.965631 ignition[731]: op(1): [started] loading QEMU firmware config module May 8 00:40:09.965637 ignition[731]: op(1): executing: "modprobe" "qemu_fw_cfg" May 8 00:40:09.986747 ignition[731]: op(1): [finished] loading QEMU firmware config module May 8 00:40:09.989079 ignition[731]: parsing config with SHA512: b69348af350e83906f640d92958b6c9d18ab799e194d9dd0e1ee7eeb925b317355b831c15d2e1b49c0a826b3b1183ce59e5a7c4802067b3713c9d3835ae42513 May 8 00:40:09.994234 unknown[731]: fetched base config from "system" May 8 00:40:09.994247 unknown[731]: fetched user config from "qemu" May 8 00:40:09.994660 ignition[731]: fetch-offline: fetch-offline passed May 8 00:40:09.994740 ignition[731]: Ignition finished successfully May 8 00:40:09.997839 systemd[1]: Finished ignition-fetch-offline.service. May 8 00:40:09.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:10.000038 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 8 00:40:10.005729 systemd[1]: Starting ignition-kargs.service... May 8 00:40:10.172755 ignition[738]: Ignition 2.14.0 May 8 00:40:10.172766 ignition[738]: Stage: kargs May 8 00:40:10.172894 ignition[738]: no configs at "/usr/lib/ignition/base.d" May 8 00:40:10.172905 ignition[738]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:40:10.173895 ignition[738]: kargs: kargs passed May 8 00:40:10.173940 ignition[738]: Ignition finished successfully May 8 00:40:10.179690 systemd[1]: Finished ignition-kargs.service. May 8 00:40:10.181000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:10.182896 systemd[1]: Starting ignition-disks.service... May 8 00:40:10.191799 ignition[744]: Ignition 2.14.0 May 8 00:40:10.192321 ignition[744]: Stage: disks May 8 00:40:10.192426 ignition[744]: no configs at "/usr/lib/ignition/base.d" May 8 00:40:10.192436 ignition[744]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:40:10.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:10.194452 systemd[1]: Finished ignition-disks.service. May 8 00:40:10.193315 ignition[744]: disks: disks passed May 8 00:40:10.195920 systemd[1]: Reached target initrd-root-device.target. May 8 00:40:10.193365 ignition[744]: Ignition finished successfully May 8 00:40:10.198123 systemd[1]: Reached target local-fs-pre.target. May 8 00:40:10.199757 systemd[1]: Reached target local-fs.target. May 8 00:40:10.200668 systemd[1]: Reached target sysinit.target. May 8 00:40:10.201544 systemd[1]: Reached target basic.target. May 8 00:40:10.203380 systemd[1]: Starting systemd-fsck-root.service... May 8 00:40:10.219793 systemd-fsck[752]: ROOT: clean, 623/553520 files, 56023/553472 blocks May 8 00:40:10.228300 systemd[1]: Finished systemd-fsck-root.service. May 8 00:40:10.230000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:10.232648 systemd[1]: Mounting sysroot.mount... May 8 00:40:10.241617 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 8 00:40:10.242976 systemd[1]: Mounted sysroot.mount. May 8 00:40:10.244939 systemd[1]: Reached target initrd-root-fs.target. May 8 00:40:10.249046 systemd[1]: Mounting sysroot-usr.mount... May 8 00:40:10.251263 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 8 00:40:10.251323 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 8 00:40:10.251357 systemd[1]: Reached target ignition-diskful.target. May 8 00:40:10.257567 systemd[1]: Mounted sysroot-usr.mount. May 8 00:40:10.259909 systemd[1]: Starting initrd-setup-root.service... May 8 00:40:10.266293 initrd-setup-root[762]: cut: /sysroot/etc/passwd: No such file or directory May 8 00:40:10.271776 initrd-setup-root[770]: cut: /sysroot/etc/group: No such file or directory May 8 00:40:10.276361 initrd-setup-root[778]: cut: /sysroot/etc/shadow: No such file or directory May 8 00:40:10.282076 initrd-setup-root[786]: cut: /sysroot/etc/gshadow: No such file or directory May 8 00:40:10.313257 systemd[1]: Finished initrd-setup-root.service. May 8 00:40:10.313000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:10.314831 systemd[1]: Starting ignition-mount.service... May 8 00:40:10.316187 systemd[1]: Starting sysroot-boot.service... May 8 00:40:10.320859 bash[803]: umount: /sysroot/usr/share/oem: not mounted. May 8 00:40:10.349306 systemd[1]: Finished sysroot-boot.service. May 8 00:40:10.350000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:10.352879 ignition[804]: INFO : Ignition 2.14.0 May 8 00:40:10.352879 ignition[804]: INFO : Stage: mount May 8 00:40:10.358010 ignition[804]: INFO : no configs at "/usr/lib/ignition/base.d" May 8 00:40:10.358010 ignition[804]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:40:10.358010 ignition[804]: INFO : mount: mount passed May 8 00:40:10.358010 ignition[804]: INFO : Ignition finished successfully May 8 00:40:10.361902 systemd[1]: Finished ignition-mount.service. May 8 00:40:10.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:10.545711 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 8 00:40:10.554174 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (813) May 8 00:40:10.556361 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 8 00:40:10.556396 kernel: BTRFS info (device vda6): using free space tree May 8 00:40:10.556410 kernel: BTRFS info (device vda6): has skinny extents May 8 00:40:10.561102 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 8 00:40:10.562444 systemd[1]: Starting ignition-files.service... May 8 00:40:10.577585 ignition[833]: INFO : Ignition 2.14.0 May 8 00:40:10.577585 ignition[833]: INFO : Stage: files May 8 00:40:10.579498 ignition[833]: INFO : no configs at "/usr/lib/ignition/base.d" May 8 00:40:10.579498 ignition[833]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:40:10.579498 ignition[833]: DEBUG : files: compiled without relabeling support, skipping May 8 00:40:10.583303 ignition[833]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 8 00:40:10.583303 ignition[833]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 8 00:40:10.583303 ignition[833]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 8 00:40:10.583303 ignition[833]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 8 00:40:10.583303 ignition[833]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 8 00:40:10.583303 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" May 8 00:40:10.582594 unknown[833]: wrote ssh authorized keys file for user: core May 8 00:40:10.593537 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" May 8 00:40:10.593537 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" May 8 00:40:10.593537 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 8 00:40:10.593537 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 8 00:40:10.593537 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 8 00:40:10.593537 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 8 00:40:10.593537 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.32.0-x86-64.raw: attempt #1 May 8 00:40:10.999293 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK May 8 00:40:11.789792 systemd-networkd[711]: eth0: Gained IPv6LL May 8 00:40:11.855467 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 8 00:40:11.858402 ignition[833]: INFO : files: op(7): [started] processing unit "coreos-metadata.service" May 8 00:40:11.858402 ignition[833]: INFO : files: op(7): op(8): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 8 00:40:11.862164 ignition[833]: INFO : files: op(7): op(8): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 8 00:40:11.862164 ignition[833]: INFO : files: op(7): [finished] processing unit "coreos-metadata.service" May 8 00:40:11.862164 ignition[833]: INFO : files: op(9): [started] setting preset to disabled for "coreos-metadata.service" May 8 00:40:11.867917 ignition[833]: INFO : files: op(9): op(a): [started] removing enablement symlink(s) for "coreos-metadata.service" May 8 00:40:11.898022 ignition[833]: INFO : files: op(9): op(a): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 8 00:40:11.899741 ignition[833]: INFO : files: op(9): [finished] setting preset to disabled for "coreos-metadata.service" May 8 00:40:11.901518 ignition[833]: INFO : files: createResultFile: createFiles: op(b): [started] writing file "/sysroot/etc/.ignition-result.json" May 8 00:40:11.903608 ignition[833]: INFO : files: createResultFile: createFiles: op(b): [finished] writing file "/sysroot/etc/.ignition-result.json" May 8 00:40:11.905488 ignition[833]: INFO : files: files passed May 8 00:40:11.906332 ignition[833]: INFO : Ignition finished successfully May 8 00:40:11.908692 systemd[1]: Finished ignition-files.service. May 8 00:40:11.921652 kernel: kauditd_printk_skb: 23 callbacks suppressed May 8 00:40:11.921694 kernel: audit: type=1130 audit(1746664811.908:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:11.908000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:11.921898 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 8 00:40:11.922679 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 8 00:40:11.924904 systemd[1]: Starting ignition-quench.service... May 8 00:40:11.928541 systemd[1]: ignition-quench.service: Deactivated successfully. May 8 00:40:11.928733 systemd[1]: Finished ignition-quench.service. May 8 00:40:11.937803 kernel: audit: type=1130 audit(1746664811.928:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:11.937857 kernel: audit: type=1131 audit(1746664811.928:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:11.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:11.928000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:11.943546 initrd-setup-root-after-ignition[858]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory May 8 00:40:11.947375 initrd-setup-root-after-ignition[860]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 8 00:40:11.950030 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 8 00:40:11.951000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:11.952422 systemd[1]: Reached target ignition-complete.target. May 8 00:40:11.957395 kernel: audit: type=1130 audit(1746664811.951:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:11.957472 systemd[1]: Starting initrd-parse-etc.service... May 8 00:40:11.979365 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 8 00:40:11.979482 systemd[1]: Finished initrd-parse-etc.service. May 8 00:40:11.981000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:11.982503 systemd[1]: Reached target initrd-fs.target. May 8 00:40:11.990004 kernel: audit: type=1130 audit(1746664811.981:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:11.990031 kernel: audit: type=1131 audit(1746664811.981:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:11.981000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:11.991620 systemd[1]: Reached target initrd.target. May 8 00:40:11.993668 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 8 00:40:11.996500 systemd[1]: Starting dracut-pre-pivot.service... May 8 00:40:12.009953 systemd[1]: Finished dracut-pre-pivot.service. May 8 00:40:12.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:12.019958 systemd[1]: Starting initrd-cleanup.service... May 8 00:40:12.023053 kernel: audit: type=1130 audit(1746664812.018:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:12.031077 systemd[1]: Stopped target nss-lookup.target. May 8 00:40:12.031517 systemd[1]: Stopped target remote-cryptsetup.target. May 8 00:40:12.033591 systemd[1]: Stopped target timers.target. May 8 00:40:12.035606 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 8 00:40:12.047134 kernel: audit: type=1131 audit(1746664812.036:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:12.036000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:12.035748 systemd[1]: Stopped dracut-pre-pivot.service. May 8 00:40:12.037323 systemd[1]: Stopped target initrd.target. May 8 00:40:12.040920 systemd[1]: Stopped target basic.target. May 8 00:40:12.047622 systemd[1]: Stopped target ignition-complete.target. May 8 00:40:12.049133 systemd[1]: Stopped target ignition-diskful.target. May 8 00:40:12.050569 systemd[1]: Stopped target initrd-root-device.target. May 8 00:40:12.052918 systemd[1]: Stopped target remote-fs.target. May 8 00:40:12.054463 systemd[1]: Stopped target remote-fs-pre.target. May 8 00:40:12.056261 systemd[1]: Stopped target sysinit.target. May 8 00:40:12.057941 systemd[1]: Stopped target local-fs.target. May 8 00:40:12.059772 systemd[1]: Stopped target local-fs-pre.target. May 8 00:40:12.061391 systemd[1]: Stopped target swap.target. May 8 00:40:12.063000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:12.062822 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 8 00:40:12.071009 kernel: audit: type=1131 audit(1746664812.063:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:12.062960 systemd[1]: Stopped dracut-pre-mount.service. May 8 00:40:12.069000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:12.071000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:12.064481 systemd[1]: Stopped target cryptsetup.target. May 8 00:40:12.077729 kernel: audit: type=1131 audit(1746664812.069:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:12.065942 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 8 00:40:12.066049 systemd[1]: Stopped dracut-initqueue.service. May 8 00:40:12.070600 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 8 00:40:12.070721 systemd[1]: Stopped ignition-fetch-offline.service. May 8 00:40:12.072587 systemd[1]: Stopped target paths.target. May 8 00:40:12.076166 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 8 00:40:12.091780 systemd[1]: Stopped systemd-ask-password-console.path. May 8 00:40:12.093682 systemd[1]: Stopped target slices.target. May 8 00:40:12.094197 systemd[1]: Stopped target sockets.target. May 8 00:40:12.096523 systemd[1]: iscsid.socket: Deactivated successfully. May 8 00:40:12.100000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:12.096628 systemd[1]: Closed iscsid.socket. May 8 00:40:12.102000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:12.098167 systemd[1]: iscsiuio.socket: Deactivated successfully. May 8 00:40:12.098256 systemd[1]: Closed iscsiuio.socket. May 8 00:40:12.099639 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 8 00:40:12.099784 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 8 00:40:12.107000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:12.101101 systemd[1]: ignition-files.service: Deactivated successfully. May 8 00:40:12.101223 systemd[1]: Stopped ignition-files.service. May 8 00:40:12.105001 systemd[1]: Stopping ignition-mount.service... May 8 00:40:12.105450 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 8 00:40:12.111000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:12.113000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:12.105594 systemd[1]: Stopped kmod-static-nodes.service. May 8 00:40:12.109077 systemd[1]: Stopping sysroot-boot.service... May 8 00:40:12.110739 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 8 00:40:12.110923 systemd[1]: Stopped systemd-udev-trigger.service. May 8 00:40:12.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:12.117000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:12.112589 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 8 00:40:12.112736 systemd[1]: Stopped dracut-pre-trigger.service. May 8 00:40:12.117619 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 8 00:40:12.117724 systemd[1]: Finished initrd-cleanup.service. May 8 00:40:12.125691 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 8 00:40:12.132462 ignition[873]: INFO : Ignition 2.14.0 May 8 00:40:12.132462 ignition[873]: INFO : Stage: umount May 8 00:40:12.134368 ignition[873]: INFO : no configs at "/usr/lib/ignition/base.d" May 8 00:40:12.134368 ignition[873]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 8 00:40:12.134368 ignition[873]: INFO : umount: umount passed May 8 00:40:12.134368 ignition[873]: INFO : Ignition finished successfully May 8 00:40:12.139479 systemd[1]: ignition-mount.service: Deactivated successfully. May 8 00:40:12.139619 systemd[1]: Stopped ignition-mount.service. May 8 00:40:12.141000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:12.141906 systemd[1]: Stopped target network.target. May 8 00:40:12.143066 systemd[1]: ignition-disks.service: Deactivated successfully. May 8 00:40:12.143138 systemd[1]: Stopped ignition-disks.service. May 8 00:40:12.142000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:12.145000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:12.143463 systemd[1]: ignition-kargs.service: Deactivated successfully. May 8 00:40:12.148000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:12.143503 systemd[1]: Stopped ignition-kargs.service. May 8 00:40:12.146563 systemd[1]: ignition-setup.service: Deactivated successfully. May 8 00:40:12.146620 systemd[1]: Stopped ignition-setup.service. May 8 00:40:12.148280 systemd[1]: Stopping systemd-networkd.service... May 8 00:40:12.149005 systemd[1]: Stopping systemd-resolved.service... May 8 00:40:12.157263 systemd[1]: systemd-resolved.service: Deactivated successfully. May 8 00:40:12.158442 systemd[1]: Stopped systemd-resolved.service. May 8 00:40:12.160000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:12.160696 systemd-networkd[711]: eth0: DHCPv6 lease lost May 8 00:40:12.162082 systemd[1]: systemd-networkd.service: Deactivated successfully. May 8 00:40:12.163000 audit: BPF prog-id=6 op=UNLOAD May 8 00:40:12.163234 systemd[1]: Stopped systemd-networkd.service. May 8 00:40:12.164000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:12.165636 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 8 00:40:12.165676 systemd[1]: Closed systemd-networkd.socket. May 8 00:40:12.167000 audit: BPF prog-id=9 op=UNLOAD May 8 00:40:12.169293 systemd[1]: Stopping network-cleanup.service... May 8 00:40:12.170286 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 8 00:40:12.173000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:12.171122 systemd[1]: Stopped parse-ip-for-networkd.service. May 8 00:40:12.175000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:12.173584 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 8 00:40:12.173635 systemd[1]: Stopped systemd-sysctl.service. May 8 00:40:12.176171 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 8 00:40:12.176266 systemd[1]: Stopped systemd-modules-load.service. May 8 00:40:12.181000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:12.181503 systemd[1]: Stopping systemd-udevd.service... May 8 00:40:12.184041 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 8 00:40:12.187443 systemd[1]: network-cleanup.service: Deactivated successfully. May 8 00:40:12.188630 systemd[1]: Stopped network-cleanup.service. May 8 00:40:12.189000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:12.193428 systemd[1]: systemd-udevd.service: Deactivated successfully. May 8 00:40:12.194629 systemd[1]: Stopped systemd-udevd.service. May 8 00:40:12.196000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:12.197639 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 8 00:40:12.197692 systemd[1]: Closed systemd-udevd-control.socket. May 8 00:40:12.199782 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 8 00:40:12.199816 systemd[1]: Closed systemd-udevd-kernel.socket. May 8 00:40:12.204000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:12.201516 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 8 00:40:12.206000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:12.201558 systemd[1]: Stopped dracut-pre-udev.service. May 8 00:40:12.204227 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 8 00:40:12.204269 systemd[1]: Stopped dracut-cmdline.service. May 8 00:40:12.206181 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 8 00:40:12.206217 systemd[1]: Stopped dracut-cmdline-ask.service. May 8 00:40:12.210000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:12.212208 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 8 00:40:12.214019 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 8 00:40:12.214064 systemd[1]: Stopped systemd-vconsole-setup.service. May 8 00:40:12.216000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:12.217216 systemd[1]: sysroot-boot.service: Deactivated successfully. May 8 00:40:12.218237 systemd[1]: Stopped sysroot-boot.service. May 8 00:40:12.219000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:12.220171 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 8 00:40:12.221386 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 8 00:40:12.223000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:12.223000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:12.223548 systemd[1]: Reached target initrd-switch-root.target. May 8 00:40:12.225385 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 8 00:40:12.226431 systemd[1]: Stopped initrd-setup-root.service. May 8 00:40:12.227000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:12.229163 systemd[1]: Starting initrd-switch-root.service... May 8 00:40:12.245195 systemd[1]: Switching root. May 8 00:40:12.265406 iscsid[716]: iscsid shutting down. May 8 00:40:12.266278 systemd-journald[197]: Received SIGTERM from PID 1 (n/a). May 8 00:40:12.266333 systemd-journald[197]: Journal stopped May 8 00:40:16.988639 kernel: SELinux: Class mctp_socket not defined in policy. May 8 00:40:16.988718 kernel: SELinux: Class anon_inode not defined in policy. May 8 00:40:16.988737 kernel: SELinux: the above unknown classes and permissions will be allowed May 8 00:40:16.988752 kernel: SELinux: policy capability network_peer_controls=1 May 8 00:40:16.988765 kernel: SELinux: policy capability open_perms=1 May 8 00:40:16.988782 kernel: SELinux: policy capability extended_socket_class=1 May 8 00:40:16.988797 kernel: SELinux: policy capability always_check_network=0 May 8 00:40:16.988819 kernel: SELinux: policy capability cgroup_seclabel=1 May 8 00:40:16.988833 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 8 00:40:16.988857 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 8 00:40:16.988870 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 8 00:40:16.988885 systemd[1]: Successfully loaded SELinux policy in 46.330ms. May 8 00:40:16.988916 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 8.439ms. May 8 00:40:16.988932 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 8 00:40:16.988946 systemd[1]: Detected virtualization kvm. May 8 00:40:16.988960 systemd[1]: Detected architecture x86-64. May 8 00:40:16.988982 systemd[1]: Detected first boot. May 8 00:40:16.988996 systemd[1]: Initializing machine ID from VM UUID. May 8 00:40:16.989028 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 8 00:40:16.989044 systemd[1]: Populated /etc with preset unit settings. May 8 00:40:16.989058 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 8 00:40:16.989078 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 8 00:40:16.989093 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 8 00:40:16.989113 systemd[1]: iscsiuio.service: Deactivated successfully. May 8 00:40:16.989127 systemd[1]: Stopped iscsiuio.service. May 8 00:40:16.989140 systemd[1]: iscsid.service: Deactivated successfully. May 8 00:40:16.989153 systemd[1]: Stopped iscsid.service. May 8 00:40:16.989166 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 8 00:40:16.989179 systemd[1]: Stopped initrd-switch-root.service. May 8 00:40:16.989193 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 8 00:40:16.989216 systemd[1]: Created slice system-addon\x2dconfig.slice. May 8 00:40:16.989236 systemd[1]: Created slice system-addon\x2drun.slice. May 8 00:40:16.989248 systemd[1]: Created slice system-getty.slice. May 8 00:40:16.989261 systemd[1]: Created slice system-modprobe.slice. May 8 00:40:16.989275 systemd[1]: Created slice system-serial\x2dgetty.slice. May 8 00:40:16.989290 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 8 00:40:16.989303 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 8 00:40:16.989315 systemd[1]: Created slice user.slice. May 8 00:40:16.989329 systemd[1]: Started systemd-ask-password-console.path. May 8 00:40:16.989343 systemd[1]: Started systemd-ask-password-wall.path. May 8 00:40:16.989360 systemd[1]: Set up automount boot.automount. May 8 00:40:16.989374 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 8 00:40:16.989389 systemd[1]: Stopped target initrd-switch-root.target. May 8 00:40:16.989403 systemd[1]: Stopped target initrd-fs.target. May 8 00:40:16.989417 systemd[1]: Stopped target initrd-root-fs.target. May 8 00:40:16.989432 systemd[1]: Reached target integritysetup.target. May 8 00:40:16.989448 systemd[1]: Reached target remote-cryptsetup.target. May 8 00:40:16.989472 systemd[1]: Reached target remote-fs.target. May 8 00:40:16.989489 systemd[1]: Reached target slices.target. May 8 00:40:16.989520 systemd[1]: Reached target swap.target. May 8 00:40:16.989537 systemd[1]: Reached target torcx.target. May 8 00:40:16.989560 systemd[1]: Reached target veritysetup.target. May 8 00:40:16.989598 systemd[1]: Listening on systemd-coredump.socket. May 8 00:40:16.989614 systemd[1]: Listening on systemd-initctl.socket. May 8 00:40:16.989635 systemd[1]: Listening on systemd-networkd.socket. May 8 00:40:16.989651 systemd[1]: Listening on systemd-udevd-control.socket. May 8 00:40:16.989665 systemd[1]: Listening on systemd-udevd-kernel.socket. May 8 00:40:16.989679 systemd[1]: Listening on systemd-userdbd.socket. May 8 00:40:16.989693 systemd[1]: Mounting dev-hugepages.mount... May 8 00:40:16.989709 systemd[1]: Mounting dev-mqueue.mount... May 8 00:40:16.989731 systemd[1]: Mounting media.mount... May 8 00:40:16.989746 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 8 00:40:16.989760 systemd[1]: Mounting sys-kernel-debug.mount... May 8 00:40:16.989784 systemd[1]: Mounting sys-kernel-tracing.mount... May 8 00:40:16.989825 systemd[1]: Mounting tmp.mount... May 8 00:40:16.989860 systemd[1]: Starting flatcar-tmpfiles.service... May 8 00:40:16.989884 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 8 00:40:16.989899 systemd[1]: Starting kmod-static-nodes.service... May 8 00:40:16.989912 systemd[1]: Starting modprobe@configfs.service... May 8 00:40:16.989925 systemd[1]: Starting modprobe@dm_mod.service... May 8 00:40:16.989939 systemd[1]: Starting modprobe@drm.service... May 8 00:40:16.989954 systemd[1]: Starting modprobe@efi_pstore.service... May 8 00:40:16.989971 systemd[1]: Starting modprobe@fuse.service... May 8 00:40:16.989989 systemd[1]: Starting modprobe@loop.service... May 8 00:40:16.990005 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 8 00:40:16.990027 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 8 00:40:16.990041 systemd[1]: Stopped systemd-fsck-root.service. May 8 00:40:16.990057 kernel: kauditd_printk_skb: 69 callbacks suppressed May 8 00:40:16.990070 kernel: audit: type=1131 audit(1746664816.942:106): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:16.990095 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 8 00:40:16.990109 kernel: loop: module loaded May 8 00:40:16.990128 systemd[1]: Stopped systemd-fsck-usr.service. May 8 00:40:16.990143 kernel: fuse: init (API version 7.34) May 8 00:40:16.990157 kernel: audit: type=1131 audit(1746664816.950:107): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:16.990172 systemd[1]: Stopped systemd-journald.service. May 8 00:40:16.990189 kernel: audit: type=1130 audit(1746664816.955:108): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:16.990210 kernel: audit: type=1131 audit(1746664816.955:109): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:16.990230 kernel: audit: type=1334 audit(1746664816.962:110): prog-id=21 op=LOAD May 8 00:40:16.990242 kernel: audit: type=1334 audit(1746664816.963:111): prog-id=22 op=LOAD May 8 00:40:16.990260 kernel: audit: type=1334 audit(1746664816.964:112): prog-id=23 op=LOAD May 8 00:40:16.990272 kernel: audit: type=1334 audit(1746664816.965:113): prog-id=19 op=UNLOAD May 8 00:40:16.990284 kernel: audit: type=1334 audit(1746664816.965:114): prog-id=20 op=UNLOAD May 8 00:40:16.990298 systemd[1]: Starting systemd-journald.service... May 8 00:40:16.990320 systemd[1]: Starting systemd-modules-load.service... May 8 00:40:16.990344 systemd[1]: Starting systemd-network-generator.service... May 8 00:40:16.990358 systemd[1]: Starting systemd-remount-fs.service... May 8 00:40:16.990371 systemd[1]: Starting systemd-udev-trigger.service... May 8 00:40:16.990385 systemd[1]: verity-setup.service: Deactivated successfully. May 8 00:40:16.990403 systemd[1]: Stopped verity-setup.service. May 8 00:40:16.990417 kernel: audit: type=1305 audit(1746664816.986:115): op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 8 00:40:16.990446 systemd-journald[996]: Journal started May 8 00:40:16.990504 systemd-journald[996]: Runtime Journal (/run/log/journal/e074bcfe6f114badaf6e989a6eb04d8f) is 6.0M, max 48.4M, 42.4M free. May 8 00:40:12.339000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 8 00:40:12.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 8 00:40:12.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 8 00:40:12.818000 audit: BPF prog-id=10 op=LOAD May 8 00:40:12.818000 audit: BPF prog-id=10 op=UNLOAD May 8 00:40:12.818000 audit: BPF prog-id=11 op=LOAD May 8 00:40:12.818000 audit: BPF prog-id=11 op=UNLOAD May 8 00:40:12.851000 audit[907]: AVC avc: denied { associate } for pid=907 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 8 00:40:12.851000 audit[907]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00018f8d4 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=890 pid=907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:12.851000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 8 00:40:12.853000 audit[907]: AVC avc: denied { associate } for pid=907 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 8 00:40:12.853000 audit[907]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00018f9a9 a2=1ed a3=0 items=2 ppid=890 pid=907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:12.853000 audit: CWD cwd="/" May 8 00:40:12.853000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:12.853000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:12.853000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 8 00:40:16.787000 audit: BPF prog-id=12 op=LOAD May 8 00:40:16.787000 audit: BPF prog-id=3 op=UNLOAD May 8 00:40:16.787000 audit: BPF prog-id=13 op=LOAD May 8 00:40:16.787000 audit: BPF prog-id=14 op=LOAD May 8 00:40:16.787000 audit: BPF prog-id=4 op=UNLOAD May 8 00:40:16.787000 audit: BPF prog-id=5 op=UNLOAD May 8 00:40:16.789000 audit: BPF prog-id=15 op=LOAD May 8 00:40:16.789000 audit: BPF prog-id=12 op=UNLOAD May 8 00:40:16.789000 audit: BPF prog-id=16 op=LOAD May 8 00:40:16.789000 audit: BPF prog-id=17 op=LOAD May 8 00:40:16.789000 audit: BPF prog-id=13 op=UNLOAD May 8 00:40:16.789000 audit: BPF prog-id=14 op=UNLOAD May 8 00:40:16.790000 audit: BPF prog-id=18 op=LOAD May 8 00:40:16.790000 audit: BPF prog-id=15 op=UNLOAD May 8 00:40:16.790000 audit: BPF prog-id=19 op=LOAD May 8 00:40:16.790000 audit: BPF prog-id=20 op=LOAD May 8 00:40:16.790000 audit: BPF prog-id=16 op=UNLOAD May 8 00:40:16.790000 audit: BPF prog-id=17 op=UNLOAD May 8 00:40:16.791000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:16.992643 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 8 00:40:16.818000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:16.821000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:16.821000 audit: BPF prog-id=18 op=UNLOAD May 8 00:40:16.825000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:16.825000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:16.942000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:16.950000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:16.955000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:16.955000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:16.962000 audit: BPF prog-id=21 op=LOAD May 8 00:40:16.963000 audit: BPF prog-id=22 op=LOAD May 8 00:40:16.964000 audit: BPF prog-id=23 op=LOAD May 8 00:40:16.965000 audit: BPF prog-id=19 op=UNLOAD May 8 00:40:16.965000 audit: BPF prog-id=20 op=UNLOAD May 8 00:40:16.986000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 8 00:40:16.986000 audit[996]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffdfd2f2d80 a2=4000 a3=7ffdfd2f2e1c items=0 ppid=1 pid=996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:16.986000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 8 00:40:16.989000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:16.785979 systemd[1]: Queued start job for default target multi-user.target. May 8 00:40:12.850832 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-05-08T00:40:12Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 8 00:40:16.785995 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 8 00:40:12.851047 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-05-08T00:40:12Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 8 00:40:16.791610 systemd[1]: systemd-journald.service: Deactivated successfully. May 8 00:40:12.851064 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-05-08T00:40:12Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 8 00:40:12.851095 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-05-08T00:40:12Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 8 00:40:12.851104 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-05-08T00:40:12Z" level=debug msg="skipped missing lower profile" missing profile=oem May 8 00:40:12.851141 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-05-08T00:40:12Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 8 00:40:12.851152 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-05-08T00:40:12Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 8 00:40:12.851352 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-05-08T00:40:12Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 8 00:40:12.851385 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-05-08T00:40:12Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 8 00:40:12.851397 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-05-08T00:40:12Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 8 00:40:12.852063 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-05-08T00:40:12Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 8 00:40:12.852096 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-05-08T00:40:12Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 8 00:40:12.852112 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-05-08T00:40:12Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 8 00:40:12.852172 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-05-08T00:40:12Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 8 00:40:12.852189 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-05-08T00:40:12Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 8 00:40:12.852202 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-05-08T00:40:12Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 8 00:40:16.478370 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-05-08T00:40:16Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 8 00:40:16.478648 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-05-08T00:40:16Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 8 00:40:16.478779 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-05-08T00:40:16Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 8 00:40:16.478991 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-05-08T00:40:16Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 8 00:40:16.479049 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-05-08T00:40:16Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 8 00:40:16.479117 /usr/lib/systemd/system-generators/torcx-generator[907]: time="2025-05-08T00:40:16Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 8 00:40:16.996169 systemd[1]: Started systemd-journald.service. May 8 00:40:16.995000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:16.996819 systemd[1]: Mounted dev-hugepages.mount. May 8 00:40:16.997728 systemd[1]: Mounted dev-mqueue.mount. May 8 00:40:16.998709 systemd[1]: Mounted media.mount. May 8 00:40:16.999542 systemd[1]: Mounted sys-kernel-debug.mount. May 8 00:40:17.000478 systemd[1]: Mounted sys-kernel-tracing.mount. May 8 00:40:17.001476 systemd[1]: Mounted tmp.mount. May 8 00:40:17.002876 systemd[1]: Finished flatcar-tmpfiles.service. May 8 00:40:17.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:17.003994 systemd[1]: Finished kmod-static-nodes.service. May 8 00:40:17.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:17.006522 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 8 00:40:17.006653 systemd[1]: Finished modprobe@configfs.service. May 8 00:40:17.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:17.007000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:17.008409 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 8 00:40:17.008518 systemd[1]: Finished modprobe@dm_mod.service. May 8 00:40:17.008000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:17.008000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:17.009644 systemd[1]: modprobe@drm.service: Deactivated successfully. May 8 00:40:17.009763 systemd[1]: Finished modprobe@drm.service. May 8 00:40:17.010000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:17.010000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:17.010810 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 8 00:40:17.010920 systemd[1]: Finished modprobe@efi_pstore.service. May 8 00:40:17.011000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:17.011000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:17.012110 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 8 00:40:17.012229 systemd[1]: Finished modprobe@fuse.service. May 8 00:40:17.012000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:17.012000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:17.013264 systemd[1]: modprobe@loop.service: Deactivated successfully. May 8 00:40:17.013369 systemd[1]: Finished modprobe@loop.service. May 8 00:40:17.013000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:17.013000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:17.014411 systemd[1]: Finished systemd-modules-load.service. May 8 00:40:17.014000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:17.015500 systemd[1]: Finished systemd-network-generator.service. May 8 00:40:17.015000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:17.016935 systemd[1]: Finished systemd-remount-fs.service. May 8 00:40:17.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:17.018587 systemd[1]: Reached target network-pre.target. May 8 00:40:17.021236 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 8 00:40:17.024397 systemd[1]: Mounting sys-kernel-config.mount... May 8 00:40:17.025370 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 8 00:40:17.027292 systemd[1]: Starting systemd-hwdb-update.service... May 8 00:40:17.029801 systemd[1]: Starting systemd-journal-flush.service... May 8 00:40:17.031260 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 8 00:40:17.038658 systemd-journald[996]: Time spent on flushing to /var/log/journal/e074bcfe6f114badaf6e989a6eb04d8f is 19.308ms for 1157 entries. May 8 00:40:17.038658 systemd-journald[996]: System Journal (/var/log/journal/e074bcfe6f114badaf6e989a6eb04d8f) is 8.0M, max 195.6M, 187.6M free. May 8 00:40:17.218861 systemd-journald[996]: Received client request to flush runtime journal. May 8 00:40:17.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:17.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:17.127000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:17.175000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:17.032641 systemd[1]: Starting systemd-random-seed.service... May 8 00:40:17.033732 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 8 00:40:17.035218 systemd[1]: Starting systemd-sysctl.service... May 8 00:40:17.038255 systemd[1]: Starting systemd-sysusers.service... May 8 00:40:17.220055 udevadm[1010]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. May 8 00:40:17.045256 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 8 00:40:17.085550 systemd[1]: Finished systemd-udev-trigger.service. May 8 00:40:17.086711 systemd[1]: Mounted sys-kernel-config.mount. May 8 00:40:17.089194 systemd[1]: Starting systemd-udev-settle.service... May 8 00:40:17.105972 systemd[1]: Finished systemd-sysctl.service. May 8 00:40:17.127319 systemd[1]: Finished systemd-sysusers.service. May 8 00:40:17.174209 systemd[1]: Finished systemd-random-seed.service. May 8 00:40:17.175676 systemd[1]: Reached target first-boot-complete.target. May 8 00:40:17.220593 systemd[1]: Finished systemd-journal-flush.service. May 8 00:40:17.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:17.897649 systemd[1]: Finished systemd-hwdb-update.service. May 8 00:40:17.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:17.899000 audit: BPF prog-id=24 op=LOAD May 8 00:40:17.899000 audit: BPF prog-id=25 op=LOAD May 8 00:40:17.899000 audit: BPF prog-id=7 op=UNLOAD May 8 00:40:17.899000 audit: BPF prog-id=8 op=UNLOAD May 8 00:40:17.900391 systemd[1]: Starting systemd-udevd.service... May 8 00:40:17.918337 systemd-udevd[1013]: Using default interface naming scheme 'v252'. May 8 00:40:17.934094 systemd[1]: Started systemd-udevd.service. May 8 00:40:17.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:17.937000 audit: BPF prog-id=26 op=LOAD May 8 00:40:17.940387 systemd[1]: Starting systemd-networkd.service... May 8 00:40:17.943000 audit: BPF prog-id=27 op=LOAD May 8 00:40:17.944000 audit: BPF prog-id=28 op=LOAD May 8 00:40:17.944000 audit: BPF prog-id=29 op=LOAD May 8 00:40:17.945730 systemd[1]: Starting systemd-userdbd.service... May 8 00:40:17.986204 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 8 00:40:17.987849 systemd[1]: Started systemd-userdbd.service. May 8 00:40:17.988000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:17.994515 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 8 00:40:18.021612 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 8 00:40:18.026598 kernel: ACPI: button: Power Button [PWRF] May 8 00:40:18.038815 systemd-networkd[1022]: lo: Link UP May 8 00:40:18.038826 systemd-networkd[1022]: lo: Gained carrier May 8 00:40:18.039309 systemd-networkd[1022]: Enumeration completed May 8 00:40:18.039480 systemd[1]: Started systemd-networkd.service. May 8 00:40:18.040000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:18.040755 systemd-networkd[1022]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 8 00:40:18.043580 systemd-networkd[1022]: eth0: Link UP May 8 00:40:18.043697 systemd-networkd[1022]: eth0: Gained carrier May 8 00:40:18.045000 audit[1020]: AVC avc: denied { confidentiality } for pid=1020 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 8 00:40:18.045000 audit[1020]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=559217056070 a1=338ac a2=7fda199afbc5 a3=5 items=110 ppid=1013 pid=1020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:18.045000 audit: CWD cwd="/" May 8 00:40:18.045000 audit: PATH item=0 name=(null) inode=50 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=1 name=(null) inode=11199 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=2 name=(null) inode=11199 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=3 name=(null) inode=11200 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=4 name=(null) inode=11199 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=5 name=(null) inode=11201 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=6 name=(null) inode=11199 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=7 name=(null) inode=11202 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=8 name=(null) inode=11202 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=9 name=(null) inode=11203 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=10 name=(null) inode=11202 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=11 name=(null) inode=11204 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=12 name=(null) inode=11202 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=13 name=(null) inode=11205 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=14 name=(null) inode=11202 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=15 name=(null) inode=11206 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=16 name=(null) inode=11202 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=17 name=(null) inode=11207 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=18 name=(null) inode=11199 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=19 name=(null) inode=11208 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=20 name=(null) inode=11208 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=21 name=(null) inode=11209 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=22 name=(null) inode=11208 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=23 name=(null) inode=11210 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=24 name=(null) inode=11208 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=25 name=(null) inode=11211 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=26 name=(null) inode=11208 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=27 name=(null) inode=11212 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=28 name=(null) inode=11208 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=29 name=(null) inode=11213 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=30 name=(null) inode=11199 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=31 name=(null) inode=11214 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=32 name=(null) inode=11214 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=33 name=(null) inode=11215 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=34 name=(null) inode=11214 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=35 name=(null) inode=11216 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=36 name=(null) inode=11214 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=37 name=(null) inode=11217 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=38 name=(null) inode=11214 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=39 name=(null) inode=11218 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=40 name=(null) inode=11214 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=41 name=(null) inode=11219 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=42 name=(null) inode=11199 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=43 name=(null) inode=11220 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=44 name=(null) inode=11220 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=45 name=(null) inode=11221 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=46 name=(null) inode=11220 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=47 name=(null) inode=11222 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=48 name=(null) inode=11220 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=49 name=(null) inode=11223 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=50 name=(null) inode=11220 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=51 name=(null) inode=11224 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=52 name=(null) inode=11220 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=53 name=(null) inode=11225 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=54 name=(null) inode=50 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=55 name=(null) inode=11226 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=56 name=(null) inode=11226 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=57 name=(null) inode=11227 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=58 name=(null) inode=11226 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=59 name=(null) inode=11228 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=60 name=(null) inode=11226 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=61 name=(null) inode=11229 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=62 name=(null) inode=11229 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=63 name=(null) inode=11230 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=64 name=(null) inode=11229 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=65 name=(null) inode=11231 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=66 name=(null) inode=11229 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=67 name=(null) inode=11232 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=68 name=(null) inode=11229 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=69 name=(null) inode=11233 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=70 name=(null) inode=11229 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=71 name=(null) inode=11234 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=72 name=(null) inode=11226 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=73 name=(null) inode=11235 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=74 name=(null) inode=11235 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=75 name=(null) inode=11236 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=76 name=(null) inode=11235 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=77 name=(null) inode=11237 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=78 name=(null) inode=11235 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=79 name=(null) inode=11238 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=80 name=(null) inode=11235 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=81 name=(null) inode=11239 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=82 name=(null) inode=11235 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=83 name=(null) inode=11240 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=84 name=(null) inode=11226 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=85 name=(null) inode=11241 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=86 name=(null) inode=11241 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.055980 systemd-networkd[1022]: eth0: DHCPv4 address 10.0.0.33/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 8 00:40:18.045000 audit: PATH item=87 name=(null) inode=11242 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=88 name=(null) inode=11241 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=89 name=(null) inode=11243 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=90 name=(null) inode=11241 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=91 name=(null) inode=11244 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=92 name=(null) inode=11241 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=93 name=(null) inode=11245 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=94 name=(null) inode=11241 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=95 name=(null) inode=11246 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=96 name=(null) inode=11226 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=97 name=(null) inode=11247 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=98 name=(null) inode=11247 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=99 name=(null) inode=11248 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=100 name=(null) inode=11247 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=101 name=(null) inode=11249 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=102 name=(null) inode=11247 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=103 name=(null) inode=11250 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=104 name=(null) inode=11247 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=105 name=(null) inode=11251 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=106 name=(null) inode=11247 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=107 name=(null) inode=11252 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PATH item=109 name=(null) inode=11253 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:40:18.045000 audit: PROCTITLE proctitle="(udev-worker)" May 8 00:40:18.063756 kernel: i801_smbus 0000:00:1f.3: Enabling SMBus device May 8 00:40:18.066514 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt May 8 00:40:18.067079 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) May 8 00:40:18.067265 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD May 8 00:40:18.072601 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 May 8 00:40:18.092612 kernel: mousedev: PS/2 mouse device common for all mice May 8 00:40:18.142198 kernel: kvm: Nested Virtualization enabled May 8 00:40:18.142326 kernel: SVM: kvm: Nested Paging enabled May 8 00:40:18.143971 kernel: SVM: Virtual VMLOAD VMSAVE supported May 8 00:40:18.144047 kernel: SVM: Virtual GIF supported May 8 00:40:18.163602 kernel: EDAC MC: Ver: 3.0.0 May 8 00:40:18.190060 systemd[1]: Finished systemd-udev-settle.service. May 8 00:40:18.190000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:18.192596 systemd[1]: Starting lvm2-activation-early.service... May 8 00:40:18.234908 lvm[1049]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 8 00:40:18.266024 systemd[1]: Finished lvm2-activation-early.service. May 8 00:40:18.266000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:18.267487 systemd[1]: Reached target cryptsetup.target. May 8 00:40:18.269886 systemd[1]: Starting lvm2-activation.service... May 8 00:40:18.274301 lvm[1050]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 8 00:40:18.299773 systemd[1]: Finished lvm2-activation.service. May 8 00:40:18.300000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:18.301015 systemd[1]: Reached target local-fs-pre.target. May 8 00:40:18.302060 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 8 00:40:18.302093 systemd[1]: Reached target local-fs.target. May 8 00:40:18.303090 systemd[1]: Reached target machines.target. May 8 00:40:18.306268 systemd[1]: Starting ldconfig.service... May 8 00:40:18.307699 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 8 00:40:18.307756 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:40:18.309498 systemd[1]: Starting systemd-boot-update.service... May 8 00:40:18.312259 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 8 00:40:18.316010 systemd[1]: Starting systemd-machine-id-commit.service... May 8 00:40:18.318666 systemd[1]: Starting systemd-sysext.service... May 8 00:40:18.320174 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1052 (bootctl) May 8 00:40:18.321829 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 8 00:40:18.336894 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 8 00:40:18.336000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:18.340334 systemd[1]: Unmounting usr-share-oem.mount... May 8 00:40:18.350786 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 8 00:40:18.350969 systemd[1]: Unmounted usr-share-oem.mount. May 8 00:40:18.388547 systemd-fsck[1060]: fsck.fat 4.2 (2021-01-31) May 8 00:40:18.388547 systemd-fsck[1060]: /dev/vda1: 791 files, 120730/258078 clusters May 8 00:40:18.389607 kernel: loop0: detected capacity change from 0 to 218376 May 8 00:40:18.390660 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 8 00:40:18.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:18.393706 systemd[1]: Mounting boot.mount... May 8 00:40:19.122880 systemd[1]: Mounted boot.mount. May 8 00:40:19.125851 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 8 00:40:19.138301 systemd[1]: Finished systemd-boot-update.service. May 8 00:40:19.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:19.144670 kernel: loop1: detected capacity change from 0 to 218376 May 8 00:40:19.148993 (sd-sysext)[1066]: Using extensions 'kubernetes'. May 8 00:40:19.149464 (sd-sysext)[1066]: Merged extensions into '/usr'. May 8 00:40:19.167493 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 8 00:40:19.169290 systemd[1]: Mounting usr-share-oem.mount... May 8 00:40:19.252597 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 8 00:40:19.254534 systemd[1]: Starting modprobe@dm_mod.service... May 8 00:40:19.256756 systemd[1]: Starting modprobe@efi_pstore.service... May 8 00:40:19.322925 systemd[1]: Starting modprobe@loop.service... May 8 00:40:19.323910 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 8 00:40:19.324057 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:40:19.324188 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 8 00:40:19.327133 systemd[1]: Mounted usr-share-oem.mount. May 8 00:40:19.328439 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 8 00:40:19.328637 systemd[1]: Finished modprobe@dm_mod.service. May 8 00:40:19.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:19.329000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:19.330115 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 8 00:40:19.330259 systemd[1]: Finished modprobe@efi_pstore.service. May 8 00:40:19.330000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:19.330000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:19.331720 systemd[1]: modprobe@loop.service: Deactivated successfully. May 8 00:40:19.331862 systemd[1]: Finished modprobe@loop.service. May 8 00:40:19.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:19.332000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:19.333344 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 8 00:40:19.333475 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 8 00:40:19.334753 systemd[1]: Finished systemd-sysext.service. May 8 00:40:19.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:19.337314 systemd[1]: Starting ensure-sysext.service... May 8 00:40:19.339450 systemd[1]: Starting systemd-tmpfiles-setup.service... May 8 00:40:19.449191 systemd[1]: Reloading. May 8 00:40:19.455596 systemd-tmpfiles[1073]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 8 00:40:19.458441 systemd-tmpfiles[1073]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 8 00:40:19.461958 systemd-tmpfiles[1073]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 8 00:40:19.499297 ldconfig[1051]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 8 00:40:19.517303 /usr/lib/systemd/system-generators/torcx-generator[1096]: time="2025-05-08T00:40:19Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 8 00:40:19.517333 /usr/lib/systemd/system-generators/torcx-generator[1096]: time="2025-05-08T00:40:19Z" level=info msg="torcx already run" May 8 00:40:19.597848 systemd-networkd[1022]: eth0: Gained IPv6LL May 8 00:40:19.611817 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 8 00:40:19.611836 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 8 00:40:19.629966 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 8 00:40:19.684000 audit: BPF prog-id=30 op=LOAD May 8 00:40:19.684000 audit: BPF prog-id=21 op=UNLOAD May 8 00:40:19.685000 audit: BPF prog-id=31 op=LOAD May 8 00:40:19.685000 audit: BPF prog-id=32 op=LOAD May 8 00:40:19.685000 audit: BPF prog-id=22 op=UNLOAD May 8 00:40:19.685000 audit: BPF prog-id=23 op=UNLOAD May 8 00:40:19.687000 audit: BPF prog-id=33 op=LOAD May 8 00:40:19.687000 audit: BPF prog-id=27 op=UNLOAD May 8 00:40:19.687000 audit: BPF prog-id=34 op=LOAD May 8 00:40:19.687000 audit: BPF prog-id=35 op=LOAD May 8 00:40:19.687000 audit: BPF prog-id=28 op=UNLOAD May 8 00:40:19.687000 audit: BPF prog-id=29 op=UNLOAD May 8 00:40:19.688000 audit: BPF prog-id=36 op=LOAD May 8 00:40:19.688000 audit: BPF prog-id=26 op=UNLOAD May 8 00:40:19.689000 audit: BPF prog-id=37 op=LOAD May 8 00:40:19.689000 audit: BPF prog-id=38 op=LOAD May 8 00:40:19.689000 audit: BPF prog-id=24 op=UNLOAD May 8 00:40:19.689000 audit: BPF prog-id=25 op=UNLOAD May 8 00:40:19.702303 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 8 00:40:19.702536 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 8 00:40:19.703849 systemd[1]: Starting modprobe@dm_mod.service... May 8 00:40:19.706089 systemd[1]: Starting modprobe@efi_pstore.service... May 8 00:40:19.708435 systemd[1]: Starting modprobe@loop.service... May 8 00:40:19.709493 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 8 00:40:19.709647 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:40:19.709765 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 8 00:40:19.711095 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 8 00:40:19.711466 systemd[1]: Finished modprobe@dm_mod.service. May 8 00:40:19.712000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:19.712000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:19.713347 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 8 00:40:19.713455 systemd[1]: Finished modprobe@efi_pstore.service. May 8 00:40:19.714000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:19.714000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:19.715022 systemd[1]: modprobe@loop.service: Deactivated successfully. May 8 00:40:19.715159 systemd[1]: Finished modprobe@loop.service. May 8 00:40:19.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:19.716000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:19.716649 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 8 00:40:19.716748 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 8 00:40:19.718140 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 8 00:40:19.718319 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 8 00:40:19.719764 systemd[1]: Starting modprobe@dm_mod.service... May 8 00:40:19.743206 systemd[1]: Starting modprobe@efi_pstore.service... May 8 00:40:19.745456 systemd[1]: Starting modprobe@loop.service... May 8 00:40:19.746369 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 8 00:40:19.746518 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:40:19.746693 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 8 00:40:19.747914 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 8 00:40:19.748105 systemd[1]: Finished modprobe@dm_mod.service. May 8 00:40:19.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:19.749000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:19.749753 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 8 00:40:19.749917 systemd[1]: Finished modprobe@efi_pstore.service. May 8 00:40:19.750000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:19.750000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:19.751680 systemd[1]: modprobe@loop.service: Deactivated successfully. May 8 00:40:19.751839 systemd[1]: Finished modprobe@loop.service. May 8 00:40:19.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:19.752000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:19.756082 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 8 00:40:19.756312 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 8 00:40:19.757814 systemd[1]: Starting modprobe@dm_mod.service... May 8 00:40:19.759936 systemd[1]: Starting modprobe@drm.service... May 8 00:40:19.762164 systemd[1]: Starting modprobe@efi_pstore.service... May 8 00:40:19.764748 systemd[1]: Starting modprobe@loop.service... May 8 00:40:19.790475 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 8 00:40:19.790658 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:40:19.792073 systemd[1]: Starting systemd-networkd-wait-online.service... May 8 00:40:19.793178 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 8 00:40:19.794453 systemd[1]: Finished systemd-tmpfiles-setup.service. May 8 00:40:19.795000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:19.796000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:19.796000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:19.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:19.798000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:19.801000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:19.801000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:19.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:19.802000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:19.803000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:19.852000 audit: BPF prog-id=39 op=LOAD May 8 00:40:19.855000 audit: BPF prog-id=40 op=LOAD May 8 00:40:19.860000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:19.972000 audit[1151]: SYSTEM_BOOT pid=1151 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 8 00:40:19.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:19.976000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:20.661000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:19.795998 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 8 00:40:19.796124 systemd[1]: Finished modprobe@dm_mod.service. May 8 00:40:19.797542 systemd[1]: modprobe@drm.service: Deactivated successfully. May 8 00:40:20.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:19.797681 systemd[1]: Finished modprobe@drm.service. May 8 00:40:19.799856 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 8 00:40:19.799986 systemd[1]: Finished modprobe@efi_pstore.service. May 8 00:40:19.801439 systemd[1]: modprobe@loop.service: Deactivated successfully. May 8 00:40:19.801553 systemd[1]: Finished modprobe@loop.service. May 8 00:40:19.802904 systemd[1]: Finished systemd-networkd-wait-online.service. May 8 00:40:19.805899 systemd[1]: Starting audit-rules.service... May 8 00:40:19.807769 systemd[1]: Starting clean-ca-certificates.service... May 8 00:40:19.850973 systemd[1]: Starting systemd-journal-catalog-update.service... May 8 00:40:19.852018 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 8 00:40:19.852110 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 8 00:40:19.854316 systemd[1]: Starting systemd-resolved.service... May 8 00:40:19.856876 systemd[1]: Starting systemd-timesyncd.service... May 8 00:40:19.858650 systemd[1]: Starting systemd-update-utmp.service... May 8 00:40:19.860092 systemd[1]: Finished ensure-sysext.service. May 8 00:40:20.690000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:19.974675 systemd[1]: Finished systemd-update-utmp.service. May 8 00:40:19.976020 systemd[1]: Started systemd-timesyncd.service. May 8 00:40:20.661880 systemd-timesyncd[1150]: Contacted time server 10.0.0.1:123 (10.0.0.1). May 8 00:40:20.661899 systemd[1]: Finished clean-ca-certificates.service. May 8 00:40:20.661927 systemd-timesyncd[1150]: Initial clock synchronization to Thu 2025-05-08 00:40:20.661802 UTC. May 8 00:40:20.663096 systemd[1]: Reached target time-set.target. May 8 00:40:20.664041 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 8 00:40:20.664077 systemd-resolved[1149]: Positive Trust Anchors: May 8 00:40:20.664087 systemd-resolved[1149]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 8 00:40:20.664121 systemd-resolved[1149]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 8 00:40:20.672639 systemd-resolved[1149]: Defaulting to hostname 'linux'. May 8 00:40:20.673048 systemd[1]: Finished systemd-journal-catalog-update.service. May 8 00:40:20.690614 systemd[1]: Started systemd-resolved.service. May 8 00:40:20.692205 systemd[1]: Reached target network.target. May 8 00:40:20.694348 systemd[1]: Reached target network-online.target. May 8 00:40:20.695463 systemd[1]: Reached target nss-lookup.target. May 8 00:40:20.697000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 8 00:40:20.697000 audit[1167]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdd00f75a0 a2=420 a3=0 items=0 ppid=1146 pid=1167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:20.697000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 8 00:40:20.698687 augenrules[1167]: No rules May 8 00:40:20.699142 systemd[1]: Finished audit-rules.service. May 8 00:40:20.775357 systemd[1]: Finished ldconfig.service. May 8 00:40:20.777695 systemd[1]: Starting systemd-update-done.service... May 8 00:40:21.187668 systemd[1]: Finished systemd-update-done.service. May 8 00:40:21.188817 systemd[1]: Reached target sysinit.target. May 8 00:40:21.189781 systemd[1]: Started motdgen.path. May 8 00:40:21.190571 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 8 00:40:21.191931 systemd[1]: Started logrotate.timer. May 8 00:40:21.192827 systemd[1]: Started mdadm.timer. May 8 00:40:21.193610 systemd[1]: Started systemd-tmpfiles-clean.timer. May 8 00:40:21.194578 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 8 00:40:21.194610 systemd[1]: Reached target paths.target. May 8 00:40:21.195451 systemd[1]: Reached target timers.target. May 8 00:40:21.196608 systemd[1]: Listening on dbus.socket. May 8 00:40:21.198893 systemd[1]: Starting docker.socket... May 8 00:40:21.201747 systemd[1]: Listening on sshd.socket. May 8 00:40:21.202592 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:40:21.202989 systemd[1]: Listening on docker.socket. May 8 00:40:21.203821 systemd[1]: Reached target sockets.target. May 8 00:40:21.204670 systemd[1]: Reached target basic.target. May 8 00:40:21.205495 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 8 00:40:21.205528 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 8 00:40:21.206368 systemd[1]: Starting containerd.service... May 8 00:40:21.208073 systemd[1]: Starting dbus.service... May 8 00:40:21.209893 systemd[1]: Starting enable-oem-cloudinit.service... May 8 00:40:21.212271 systemd[1]: Starting extend-filesystems.service... May 8 00:40:21.213354 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 8 00:40:21.213686 jq[1177]: false May 8 00:40:21.214649 systemd[1]: Starting kubelet.service... May 8 00:40:21.216347 systemd[1]: Starting motdgen.service... May 8 00:40:21.218226 systemd[1]: Starting ssh-key-proc-cmdline.service... May 8 00:40:21.220366 systemd[1]: Starting sshd-keygen.service... May 8 00:40:21.227852 extend-filesystems[1178]: Found loop1 May 8 00:40:21.227852 extend-filesystems[1178]: Found sr0 May 8 00:40:21.227852 extend-filesystems[1178]: Found vda May 8 00:40:21.227852 extend-filesystems[1178]: Found vda1 May 8 00:40:21.227852 extend-filesystems[1178]: Found vda2 May 8 00:40:21.227852 extend-filesystems[1178]: Found vda3 May 8 00:40:21.227852 extend-filesystems[1178]: Found usr May 8 00:40:21.227852 extend-filesystems[1178]: Found vda4 May 8 00:40:21.227852 extend-filesystems[1178]: Found vda6 May 8 00:40:21.227852 extend-filesystems[1178]: Found vda7 May 8 00:40:21.227852 extend-filesystems[1178]: Found vda9 May 8 00:40:21.227852 extend-filesystems[1178]: Checking size of /dev/vda9 May 8 00:40:21.225081 systemd[1]: Starting systemd-logind.service... May 8 00:40:21.226219 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 8 00:40:21.226349 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 8 00:40:21.226792 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 8 00:40:21.242192 jq[1191]: true May 8 00:40:21.227553 systemd[1]: Starting update-engine.service... May 8 00:40:21.230585 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 8 00:40:21.236322 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 8 00:40:21.236519 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 8 00:40:21.238304 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 8 00:40:21.240462 systemd[1]: Finished ssh-key-proc-cmdline.service. May 8 00:40:21.461749 jq[1195]: true May 8 00:40:21.474900 dbus-daemon[1176]: [system] SELinux support is enabled May 8 00:40:21.475086 systemd[1]: Started dbus.service. May 8 00:40:21.524567 env[1196]: time="2025-05-08T00:40:21.517299302Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 8 00:40:21.526413 systemd[1]: motdgen.service: Deactivated successfully. May 8 00:40:21.526571 systemd[1]: Finished motdgen.service. May 8 00:40:21.528238 systemd-logind[1186]: Watching system buttons on /dev/input/event1 (Power Button) May 8 00:40:21.528261 systemd-logind[1186]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 8 00:40:21.529379 systemd-logind[1186]: New seat seat0. May 8 00:40:21.532318 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 8 00:40:21.532362 systemd[1]: Reached target system-config.target. May 8 00:40:21.533449 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 8 00:40:21.533464 systemd[1]: Reached target user-config.target. May 8 00:40:21.537558 env[1196]: time="2025-05-08T00:40:21.537524068Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 8 00:40:21.537700 env[1196]: time="2025-05-08T00:40:21.537680732Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 8 00:40:21.539702 systemd[1]: Started systemd-logind.service. May 8 00:40:21.540535 env[1196]: time="2025-05-08T00:40:21.540401335Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.180-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 8 00:40:21.540845 env[1196]: time="2025-05-08T00:40:21.540743106Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 8 00:40:21.541005 env[1196]: time="2025-05-08T00:40:21.540981453Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 8 00:40:21.541005 env[1196]: time="2025-05-08T00:40:21.541003805Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 8 00:40:21.541107 env[1196]: time="2025-05-08T00:40:21.541015848Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 8 00:40:21.541107 env[1196]: time="2025-05-08T00:40:21.541024334Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 8 00:40:21.541107 env[1196]: time="2025-05-08T00:40:21.541085338Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 8 00:40:21.541344 env[1196]: time="2025-05-08T00:40:21.541325499Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 8 00:40:21.541463 env[1196]: time="2025-05-08T00:40:21.541443189Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 8 00:40:21.541463 env[1196]: time="2025-05-08T00:40:21.541461464Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 8 00:40:21.541541 env[1196]: time="2025-05-08T00:40:21.541504003Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 8 00:40:21.541541 env[1196]: time="2025-05-08T00:40:21.541515735Z" level=info msg="metadata content store policy set" policy=shared May 8 00:40:21.707707 update_engine[1187]: I0508 00:40:21.707341 1187 main.cc:92] Flatcar Update Engine starting May 8 00:40:21.711829 update_engine[1187]: I0508 00:40:21.710597 1187 update_check_scheduler.cc:74] Next update check in 6m30s May 8 00:40:21.729294 extend-filesystems[1178]: Resized partition /dev/vda9 May 8 00:40:21.779768 systemd[1]: Started update-engine.service. May 8 00:40:21.793231 systemd[1]: Started locksmithd.service. May 8 00:40:21.927386 extend-filesystems[1230]: resize2fs 1.46.5 (30-Dec-2021) May 8 00:40:21.960003 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks May 8 00:40:22.191336 sshd_keygen[1192]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 8 00:40:22.271370 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 8 00:40:22.279672 systemd[1]: Finished systemd-machine-id-commit.service. May 8 00:40:22.301844 systemd[1]: Finished sshd-keygen.service. May 8 00:40:22.304757 systemd[1]: Starting issuegen.service... May 8 00:40:22.310722 systemd[1]: issuegen.service: Deactivated successfully. May 8 00:40:22.310884 systemd[1]: Finished issuegen.service. May 8 00:40:22.313277 systemd[1]: Starting systemd-user-sessions.service... May 8 00:40:22.392440 systemd[1]: Finished systemd-user-sessions.service. May 8 00:40:22.394930 systemd[1]: Started getty@tty1.service. May 8 00:40:22.397163 systemd[1]: Started serial-getty@ttyS0.service. May 8 00:40:22.398472 systemd[1]: Reached target getty.target. May 8 00:40:23.066806 kernel: EXT4-fs (vda9): resized filesystem to 1864699 May 8 00:40:22.567031 locksmithd[1231]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 8 00:40:23.067497 extend-filesystems[1230]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 8 00:40:23.067497 extend-filesystems[1230]: old_desc_blocks = 1, new_desc_blocks = 1 May 8 00:40:23.067497 extend-filesystems[1230]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. May 8 00:40:23.072147 extend-filesystems[1178]: Resized filesystem in /dev/vda9 May 8 00:40:23.070740 systemd[1]: extend-filesystems.service: Deactivated successfully. May 8 00:40:23.075384 env[1196]: time="2025-05-08T00:40:23.069527729Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 8 00:40:23.075384 env[1196]: time="2025-05-08T00:40:23.069653555Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 8 00:40:23.075384 env[1196]: time="2025-05-08T00:40:23.069684984Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 8 00:40:23.075384 env[1196]: time="2025-05-08T00:40:23.069853540Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 8 00:40:23.075384 env[1196]: time="2025-05-08T00:40:23.069885210Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 8 00:40:23.075384 env[1196]: time="2025-05-08T00:40:23.069924153Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 8 00:40:23.075384 env[1196]: time="2025-05-08T00:40:23.069982903Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 8 00:40:23.075384 env[1196]: time="2025-05-08T00:40:23.070026044Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 8 00:40:23.075384 env[1196]: time="2025-05-08T00:40:23.070053355Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 8 00:40:23.075384 env[1196]: time="2025-05-08T00:40:23.070079374Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 8 00:40:23.075384 env[1196]: time="2025-05-08T00:40:23.070101215Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 8 00:40:23.075384 env[1196]: time="2025-05-08T00:40:23.070122224Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 8 00:40:23.075384 env[1196]: time="2025-05-08T00:40:23.070361754Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 8 00:40:23.075384 env[1196]: time="2025-05-08T00:40:23.070548574Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 8 00:40:23.076176 bash[1227]: Updated "/home/core/.ssh/authorized_keys" May 8 00:40:23.072279 systemd[1]: Finished extend-filesystems.service. May 8 00:40:23.076342 env[1196]: time="2025-05-08T00:40:23.071097423Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 8 00:40:23.076342 env[1196]: time="2025-05-08T00:40:23.071157246Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 8 00:40:23.076342 env[1196]: time="2025-05-08T00:40:23.071178005Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 8 00:40:23.076342 env[1196]: time="2025-05-08T00:40:23.071297659Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 8 00:40:23.076342 env[1196]: time="2025-05-08T00:40:23.071319650Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 8 00:40:23.076342 env[1196]: time="2025-05-08T00:40:23.071350949Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 8 00:40:23.076342 env[1196]: time="2025-05-08T00:40:23.071370566Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 8 00:40:23.076342 env[1196]: time="2025-05-08T00:40:23.071388790Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 8 00:40:23.076342 env[1196]: time="2025-05-08T00:40:23.071413476Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 8 00:40:23.076342 env[1196]: time="2025-05-08T00:40:23.071439515Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 8 00:40:23.076342 env[1196]: time="2025-05-08T00:40:23.071453772Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 8 00:40:23.076342 env[1196]: time="2025-05-08T00:40:23.071482105Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 8 00:40:23.076342 env[1196]: time="2025-05-08T00:40:23.071656913Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 8 00:40:23.076342 env[1196]: time="2025-05-08T00:40:23.071681389Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 8 00:40:23.076342 env[1196]: time="2025-05-08T00:40:23.071706366Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 8 00:40:23.075564 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 8 00:40:23.076757 env[1196]: time="2025-05-08T00:40:23.071731202Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 8 00:40:23.076757 env[1196]: time="2025-05-08T00:40:23.071760607Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 8 00:40:23.076757 env[1196]: time="2025-05-08T00:40:23.071777038Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 8 00:40:23.076757 env[1196]: time="2025-05-08T00:40:23.071826832Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 8 00:40:23.076757 env[1196]: time="2025-05-08T00:40:23.071906992Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 8 00:40:23.076863 env[1196]: time="2025-05-08T00:40:23.075081937Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 8 00:40:23.076863 env[1196]: time="2025-05-08T00:40:23.075246907Z" level=info msg="Connect containerd service" May 8 00:40:23.076863 env[1196]: time="2025-05-08T00:40:23.075356372Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 8 00:40:23.076863 env[1196]: time="2025-05-08T00:40:23.076610575Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 8 00:40:23.077638 env[1196]: time="2025-05-08T00:40:23.077052383Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 8 00:40:23.077638 env[1196]: time="2025-05-08T00:40:23.077111083Z" level=info msg=serving... address=/run/containerd/containerd.sock May 8 00:40:23.077638 env[1196]: time="2025-05-08T00:40:23.077194840Z" level=info msg="containerd successfully booted in 1.564822s" May 8 00:40:23.077221 systemd[1]: Started containerd.service. May 8 00:40:23.078594 env[1196]: time="2025-05-08T00:40:23.078259357Z" level=info msg="Start subscribing containerd event" May 8 00:40:23.078594 env[1196]: time="2025-05-08T00:40:23.078401504Z" level=info msg="Start recovering state" May 8 00:40:23.078594 env[1196]: time="2025-05-08T00:40:23.078522010Z" level=info msg="Start event monitor" May 8 00:40:23.078594 env[1196]: time="2025-05-08T00:40:23.078547949Z" level=info msg="Start snapshots syncer" May 8 00:40:23.078594 env[1196]: time="2025-05-08T00:40:23.078558007Z" level=info msg="Start cni network conf syncer for default" May 8 00:40:23.078594 env[1196]: time="2025-05-08T00:40:23.078565141Z" level=info msg="Start streaming server" May 8 00:40:24.231085 systemd[1]: Started kubelet.service. May 8 00:40:24.232685 systemd[1]: Reached target multi-user.target. May 8 00:40:24.235396 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 8 00:40:24.244057 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 8 00:40:24.244283 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 8 00:40:24.245812 systemd[1]: Startup finished in 1.026s (kernel) + 5.267s (initrd) + 11.269s (userspace) = 17.563s. May 8 00:40:24.786504 kubelet[1260]: E0508 00:40:24.786432 1260 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 8 00:40:24.788611 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 8 00:40:24.788775 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 8 00:40:24.789088 systemd[1]: kubelet.service: Consumed 1.714s CPU time. May 8 00:40:30.759837 systemd[1]: Created slice system-sshd.slice. May 8 00:40:30.761098 systemd[1]: Started sshd@0-10.0.0.33:22-10.0.0.1:56868.service. May 8 00:40:30.857577 sshd[1269]: Accepted publickey for core from 10.0.0.1 port 56868 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:40:30.859557 sshd[1269]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:40:30.868693 systemd-logind[1186]: New session 1 of user core. May 8 00:40:30.869719 systemd[1]: Created slice user-500.slice. May 8 00:40:30.870959 systemd[1]: Starting user-runtime-dir@500.service... May 8 00:40:30.880626 systemd[1]: Finished user-runtime-dir@500.service. May 8 00:40:30.882168 systemd[1]: Starting user@500.service... May 8 00:40:30.885952 (systemd)[1272]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 8 00:40:30.977101 systemd[1272]: Queued start job for default target default.target. May 8 00:40:30.977682 systemd[1272]: Reached target paths.target. May 8 00:40:30.977702 systemd[1272]: Reached target sockets.target. May 8 00:40:30.977718 systemd[1272]: Reached target timers.target. May 8 00:40:30.977732 systemd[1272]: Reached target basic.target. May 8 00:40:30.977785 systemd[1272]: Reached target default.target. May 8 00:40:30.977815 systemd[1272]: Startup finished in 84ms. May 8 00:40:30.977953 systemd[1]: Started user@500.service. May 8 00:40:30.979088 systemd[1]: Started session-1.scope. May 8 00:40:31.031478 systemd[1]: Started sshd@1-10.0.0.33:22-10.0.0.1:56876.service. May 8 00:40:31.071286 sshd[1281]: Accepted publickey for core from 10.0.0.1 port 56876 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:40:31.073137 sshd[1281]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:40:31.077420 systemd-logind[1186]: New session 2 of user core. May 8 00:40:31.078786 systemd[1]: Started session-2.scope. May 8 00:40:31.140520 sshd[1281]: pam_unix(sshd:session): session closed for user core May 8 00:40:31.143371 systemd[1]: sshd@1-10.0.0.33:22-10.0.0.1:56876.service: Deactivated successfully. May 8 00:40:31.143868 systemd[1]: session-2.scope: Deactivated successfully. May 8 00:40:31.144317 systemd-logind[1186]: Session 2 logged out. Waiting for processes to exit. May 8 00:40:31.145346 systemd[1]: Started sshd@2-10.0.0.33:22-10.0.0.1:56890.service. May 8 00:40:31.146220 systemd-logind[1186]: Removed session 2. May 8 00:40:31.183996 sshd[1287]: Accepted publickey for core from 10.0.0.1 port 56890 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:40:31.185340 sshd[1287]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:40:31.188826 systemd-logind[1186]: New session 3 of user core. May 8 00:40:31.189670 systemd[1]: Started session-3.scope. May 8 00:40:31.239533 sshd[1287]: pam_unix(sshd:session): session closed for user core May 8 00:40:31.242390 systemd[1]: sshd@2-10.0.0.33:22-10.0.0.1:56890.service: Deactivated successfully. May 8 00:40:31.242934 systemd[1]: session-3.scope: Deactivated successfully. May 8 00:40:31.243424 systemd-logind[1186]: Session 3 logged out. Waiting for processes to exit. May 8 00:40:31.244544 systemd[1]: Started sshd@3-10.0.0.33:22-10.0.0.1:56906.service. May 8 00:40:31.245455 systemd-logind[1186]: Removed session 3. May 8 00:40:31.283007 sshd[1293]: Accepted publickey for core from 10.0.0.1 port 56906 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:40:31.284227 sshd[1293]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:40:31.287835 systemd-logind[1186]: New session 4 of user core. May 8 00:40:31.288965 systemd[1]: Started session-4.scope. May 8 00:40:31.343746 sshd[1293]: pam_unix(sshd:session): session closed for user core May 8 00:40:31.346902 systemd[1]: sshd@3-10.0.0.33:22-10.0.0.1:56906.service: Deactivated successfully. May 8 00:40:31.347596 systemd[1]: session-4.scope: Deactivated successfully. May 8 00:40:31.348233 systemd-logind[1186]: Session 4 logged out. Waiting for processes to exit. May 8 00:40:31.349588 systemd[1]: Started sshd@4-10.0.0.33:22-10.0.0.1:56908.service. May 8 00:40:31.350422 systemd-logind[1186]: Removed session 4. May 8 00:40:31.387821 sshd[1299]: Accepted publickey for core from 10.0.0.1 port 56908 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:40:31.389075 sshd[1299]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:40:31.392528 systemd-logind[1186]: New session 5 of user core. May 8 00:40:31.393296 systemd[1]: Started session-5.scope. May 8 00:40:31.464736 sudo[1302]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 8 00:40:31.465019 sudo[1302]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 8 00:40:31.475291 dbus-daemon[1176]: \xd0\u000d\x8f\xd6\xedU: received setenforce notice (enforcing=213398400) May 8 00:40:31.477353 sudo[1302]: pam_unix(sudo:session): session closed for user root May 8 00:40:31.491277 sshd[1299]: pam_unix(sshd:session): session closed for user core May 8 00:40:31.495130 systemd[1]: Started sshd@5-10.0.0.33:22-10.0.0.1:56916.service. May 8 00:40:31.495812 systemd[1]: sshd@4-10.0.0.33:22-10.0.0.1:56908.service: Deactivated successfully. May 8 00:40:31.496414 systemd[1]: session-5.scope: Deactivated successfully. May 8 00:40:31.496908 systemd-logind[1186]: Session 5 logged out. Waiting for processes to exit. May 8 00:40:31.497956 systemd-logind[1186]: Removed session 5. May 8 00:40:31.534049 sshd[1305]: Accepted publickey for core from 10.0.0.1 port 56916 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:40:31.535139 sshd[1305]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:40:31.538835 systemd-logind[1186]: New session 6 of user core. May 8 00:40:31.539618 systemd[1]: Started session-6.scope. May 8 00:40:31.593990 sudo[1310]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 8 00:40:31.594277 sudo[1310]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 8 00:40:31.597767 sudo[1310]: pam_unix(sudo:session): session closed for user root May 8 00:40:31.602543 sudo[1309]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 8 00:40:31.602759 sudo[1309]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 8 00:40:31.612508 systemd[1]: Stopping audit-rules.service... May 8 00:40:31.612000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 8 00:40:31.613671 auditctl[1313]: No rules May 8 00:40:31.613811 systemd[1]: audit-rules.service: Deactivated successfully. May 8 00:40:31.613939 systemd[1]: Stopped audit-rules.service. May 8 00:40:31.615175 systemd[1]: Starting audit-rules.service... May 8 00:40:31.633590 augenrules[1330]: No rules May 8 00:40:31.634132 systemd[1]: Finished audit-rules.service. May 8 00:40:31.634820 sudo[1309]: pam_unix(sudo:session): session closed for user root May 8 00:40:31.667527 sshd[1305]: pam_unix(sshd:session): session closed for user core May 8 00:40:31.668200 kernel: kauditd_printk_skb: 217 callbacks suppressed May 8 00:40:31.668243 kernel: audit: type=1305 audit(1746664831.612:216): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 8 00:40:31.612000 audit[1313]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcaf87f070 a2=420 a3=0 items=0 ppid=1 pid=1313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:31.670568 systemd[1]: sshd@5-10.0.0.33:22-10.0.0.1:56916.service: Deactivated successfully. May 8 00:40:31.671129 systemd[1]: session-6.scope: Deactivated successfully. May 8 00:40:31.671592 systemd-logind[1186]: Session 6 logged out. Waiting for processes to exit. May 8 00:40:31.672659 systemd[1]: Started sshd@6-10.0.0.33:22-10.0.0.1:56918.service. May 8 00:40:31.673645 systemd-logind[1186]: Removed session 6. May 8 00:40:31.675659 kernel: audit: type=1300 audit(1746664831.612:216): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcaf87f070 a2=420 a3=0 items=0 ppid=1 pid=1313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:31.675693 kernel: audit: type=1327 audit(1746664831.612:216): proctitle=2F7362696E2F617564697463746C002D44 May 8 00:40:31.612000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 8 00:40:31.612000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:31.681007 kernel: audit: type=1131 audit(1746664831.612:217): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:31.681072 kernel: audit: type=1130 audit(1746664831.633:218): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:31.633000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:31.780014 kernel: audit: type=1106 audit(1746664831.633:219): pid=1309 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:40:31.633000 audit[1309]: USER_END pid=1309 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:40:31.633000 audit[1309]: CRED_DISP pid=1309 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:40:31.786794 kernel: audit: type=1104 audit(1746664831.633:220): pid=1309 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:40:31.786855 kernel: audit: type=1106 audit(1746664831.667:221): pid=1305 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:31.667000 audit[1305]: USER_END pid=1305 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:31.667000 audit[1305]: CRED_DISP pid=1305 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:31.795416 kernel: audit: type=1104 audit(1746664831.667:222): pid=1305 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:31.795454 kernel: audit: type=1131 audit(1746664831.669:223): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.33:22-10.0.0.1:56916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:31.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.33:22-10.0.0.1:56916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:31.671000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.33:22-10.0.0.1:56918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:31.813000 audit[1336]: USER_ACCT pid=1336 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:31.814433 sshd[1336]: Accepted publickey for core from 10.0.0.1 port 56918 ssh2: RSA SHA256:1LBxu83eHkdm4X8dsk4zPTne32Wp9pee2vrXUZ4T9Dg May 8 00:40:31.814000 audit[1336]: CRED_ACQ pid=1336 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:31.814000 audit[1336]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc35119790 a2=3 a3=0 items=0 ppid=1 pid=1336 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:31.814000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 8 00:40:31.815554 sshd[1336]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 8 00:40:31.819278 systemd-logind[1186]: New session 7 of user core. May 8 00:40:31.820212 systemd[1]: Started session-7.scope. May 8 00:40:31.823000 audit[1336]: USER_START pid=1336 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:31.824000 audit[1338]: CRED_ACQ pid=1338 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:31.874000 audit[1339]: USER_ACCT pid=1339 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:40:31.875796 sudo[1339]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 8 00:40:31.874000 audit[1339]: CRED_REFR pid=1339 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:40:31.876067 sudo[1339]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 8 00:40:31.876000 audit[1339]: USER_START pid=1339 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:40:31.887756 systemd[1]: Starting coreos-metadata.service... May 8 00:40:31.893876 systemd[1]: coreos-metadata.service: Deactivated successfully. May 8 00:40:31.894023 systemd[1]: Finished coreos-metadata.service. May 8 00:40:31.893000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:31.893000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:32.974321 systemd[1]: Stopped kubelet.service. May 8 00:40:32.973000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:32.973000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:32.974473 systemd[1]: kubelet.service: Consumed 1.714s CPU time. May 8 00:40:32.976276 systemd[1]: Starting kubelet.service... May 8 00:40:32.999468 systemd[1]: Reloading. May 8 00:40:33.096749 /usr/lib/systemd/system-generators/torcx-generator[1398]: time="2025-05-08T00:40:33Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 8 00:40:33.096776 /usr/lib/systemd/system-generators/torcx-generator[1398]: time="2025-05-08T00:40:33Z" level=info msg="torcx already run" May 8 00:40:33.970331 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 8 00:40:33.970347 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 8 00:40:33.987282 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 8 00:40:34.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.048000 audit: BPF prog-id=46 op=LOAD May 8 00:40:34.048000 audit: BPF prog-id=30 op=UNLOAD May 8 00:40:34.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.048000 audit: BPF prog-id=47 op=LOAD May 8 00:40:34.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.048000 audit: BPF prog-id=48 op=LOAD May 8 00:40:34.048000 audit: BPF prog-id=31 op=UNLOAD May 8 00:40:34.048000 audit: BPF prog-id=32 op=UNLOAD May 8 00:40:34.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.049000 audit: BPF prog-id=49 op=LOAD May 8 00:40:34.049000 audit: BPF prog-id=44 op=UNLOAD May 8 00:40:34.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.052000 audit: BPF prog-id=50 op=LOAD May 8 00:40:34.052000 audit: BPF prog-id=33 op=UNLOAD May 8 00:40:34.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.052000 audit: BPF prog-id=51 op=LOAD May 8 00:40:34.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.052000 audit: BPF prog-id=52 op=LOAD May 8 00:40:34.052000 audit: BPF prog-id=34 op=UNLOAD May 8 00:40:34.052000 audit: BPF prog-id=35 op=UNLOAD May 8 00:40:34.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.053000 audit: BPF prog-id=53 op=LOAD May 8 00:40:34.053000 audit: BPF prog-id=36 op=UNLOAD May 8 00:40:34.055000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.055000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.055000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.055000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.055000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.055000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.055000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.055000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.055000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.056000 audit: BPF prog-id=54 op=LOAD May 8 00:40:34.056000 audit: BPF prog-id=41 op=UNLOAD May 8 00:40:34.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.056000 audit: BPF prog-id=55 op=LOAD May 8 00:40:34.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.056000 audit: BPF prog-id=56 op=LOAD May 8 00:40:34.056000 audit: BPF prog-id=42 op=UNLOAD May 8 00:40:34.056000 audit: BPF prog-id=43 op=UNLOAD May 8 00:40:34.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.056000 audit: BPF prog-id=57 op=LOAD May 8 00:40:34.056000 audit: BPF prog-id=39 op=UNLOAD May 8 00:40:34.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.057000 audit: BPF prog-id=58 op=LOAD May 8 00:40:34.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.057000 audit: BPF prog-id=59 op=LOAD May 8 00:40:34.057000 audit: BPF prog-id=37 op=UNLOAD May 8 00:40:34.057000 audit: BPF prog-id=38 op=UNLOAD May 8 00:40:34.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:34.058000 audit: BPF prog-id=60 op=LOAD May 8 00:40:34.058000 audit: BPF prog-id=40 op=UNLOAD May 8 00:40:34.070000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:34.071025 systemd[1]: Started kubelet.service. May 8 00:40:34.074769 systemd[1]: Stopping kubelet.service... May 8 00:40:34.075273 systemd[1]: kubelet.service: Deactivated successfully. May 8 00:40:34.075484 systemd[1]: Stopped kubelet.service. May 8 00:40:34.074000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:34.077452 systemd[1]: Starting kubelet.service... May 8 00:40:34.166212 systemd[1]: Started kubelet.service. May 8 00:40:34.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:34.286789 kubelet[1450]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 8 00:40:34.286789 kubelet[1450]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 8 00:40:34.286789 kubelet[1450]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 8 00:40:34.286789 kubelet[1450]: I0508 00:40:34.286761 1450 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 8 00:40:35.672370 kubelet[1450]: I0508 00:40:35.672312 1450 server.go:520] "Kubelet version" kubeletVersion="v1.32.0" May 8 00:40:35.672370 kubelet[1450]: I0508 00:40:35.672346 1450 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 8 00:40:35.672791 kubelet[1450]: I0508 00:40:35.672587 1450 server.go:954] "Client rotation is on, will bootstrap in background" May 8 00:40:35.765161 kubelet[1450]: I0508 00:40:35.765043 1450 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 8 00:40:35.785870 kubelet[1450]: E0508 00:40:35.785728 1450 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 8 00:40:35.785870 kubelet[1450]: I0508 00:40:35.785804 1450 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 8 00:40:35.792272 kubelet[1450]: I0508 00:40:35.792229 1450 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 8 00:40:35.792830 kubelet[1450]: I0508 00:40:35.792764 1450 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 8 00:40:35.793078 kubelet[1450]: I0508 00:40:35.792808 1450 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.0.0.33","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 8 00:40:35.793230 kubelet[1450]: I0508 00:40:35.793084 1450 topology_manager.go:138] "Creating topology manager with none policy" May 8 00:40:35.793230 kubelet[1450]: I0508 00:40:35.793095 1450 container_manager_linux.go:304] "Creating device plugin manager" May 8 00:40:35.793280 kubelet[1450]: I0508 00:40:35.793244 1450 state_mem.go:36] "Initialized new in-memory state store" May 8 00:40:35.797240 kubelet[1450]: I0508 00:40:35.797134 1450 kubelet.go:446] "Attempting to sync node with API server" May 8 00:40:35.797240 kubelet[1450]: I0508 00:40:35.797177 1450 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 8 00:40:35.797240 kubelet[1450]: I0508 00:40:35.797206 1450 kubelet.go:352] "Adding apiserver pod source" May 8 00:40:35.797240 kubelet[1450]: I0508 00:40:35.797222 1450 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 8 00:40:35.797580 kubelet[1450]: E0508 00:40:35.797429 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:40:35.797580 kubelet[1450]: E0508 00:40:35.797430 1450 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:40:35.816337 kubelet[1450]: I0508 00:40:35.816300 1450 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 8 00:40:35.816781 kubelet[1450]: I0508 00:40:35.816765 1450 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 8 00:40:35.818003 kubelet[1450]: W0508 00:40:35.817951 1450 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 8 00:40:35.822607 kubelet[1450]: I0508 00:40:35.822583 1450 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 8 00:40:35.822701 kubelet[1450]: I0508 00:40:35.822626 1450 server.go:1287] "Started kubelet" May 8 00:40:35.832000 audit[1450]: AVC avc: denied { mac_admin } for pid=1450 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:35.832000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 8 00:40:35.832000 audit[1450]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0003a77a0 a1=c00097c600 a2=c0003a7740 a3=25 items=0 ppid=1 pid=1450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:35.832000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 8 00:40:35.832000 audit[1450]: AVC avc: denied { mac_admin } for pid=1450 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:35.832000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 8 00:40:35.832000 audit[1450]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bed8c0 a1=c00097c618 a2=c0003a78c0 a3=25 items=0 ppid=1 pid=1450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:35.832000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 8 00:40:35.834194 kubelet[1450]: I0508 00:40:35.833594 1450 kubelet.go:1513] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 8 00:40:35.834194 kubelet[1450]: I0508 00:40:35.833636 1450 kubelet.go:1517] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 8 00:40:35.834194 kubelet[1450]: I0508 00:40:35.833707 1450 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 8 00:40:35.835402 kubelet[1450]: I0508 00:40:35.835307 1450 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 8 00:40:35.836712 kubelet[1450]: I0508 00:40:35.836674 1450 server.go:490] "Adding debug handlers to kubelet server" May 8 00:40:35.838012 kubelet[1450]: I0508 00:40:35.837875 1450 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 8 00:40:35.839403 kubelet[1450]: I0508 00:40:35.839190 1450 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 8 00:40:35.839583 kubelet[1450]: I0508 00:40:35.839551 1450 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 8 00:40:35.840551 kubelet[1450]: E0508 00:40:35.840513 1450 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.0.0.33\" not found" May 8 00:40:35.840628 kubelet[1450]: I0508 00:40:35.840572 1450 volume_manager.go:297] "Starting Kubelet Volume Manager" May 8 00:40:35.841354 kubelet[1450]: I0508 00:40:35.840811 1450 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 8 00:40:35.841354 kubelet[1450]: I0508 00:40:35.840942 1450 reconciler.go:26] "Reconciler: start to sync state" May 8 00:40:35.841354 kubelet[1450]: I0508 00:40:35.841228 1450 factory.go:221] Registration of the systemd container factory successfully May 8 00:40:35.842178 kubelet[1450]: I0508 00:40:35.841528 1450 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 8 00:40:35.842178 kubelet[1450]: E0508 00:40:35.841935 1450 kubelet.go:1561] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 8 00:40:35.843556 kubelet[1450]: I0508 00:40:35.843512 1450 factory.go:221] Registration of the containerd container factory successfully May 8 00:40:35.864869 kubelet[1450]: E0508 00:40:35.864817 1450 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.0.0.33\" not found" node="10.0.0.33" May 8 00:40:35.874431 kubelet[1450]: I0508 00:40:35.874389 1450 cpu_manager.go:221] "Starting CPU manager" policy="none" May 8 00:40:35.874632 kubelet[1450]: I0508 00:40:35.874612 1450 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 8 00:40:35.874752 kubelet[1450]: I0508 00:40:35.874736 1450 state_mem.go:36] "Initialized new in-memory state store" May 8 00:40:35.887863 kubelet[1450]: I0508 00:40:35.887827 1450 policy_none.go:49] "None policy: Start" May 8 00:40:35.888098 kubelet[1450]: I0508 00:40:35.888081 1450 memory_manager.go:186] "Starting memorymanager" policy="None" May 8 00:40:35.888186 kubelet[1450]: I0508 00:40:35.888171 1450 state_mem.go:35] "Initializing new in-memory state store" May 8 00:40:35.942693 kubelet[1450]: E0508 00:40:35.941044 1450 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"10.0.0.33\" not found" May 8 00:40:35.962766 systemd[1]: Created slice kubepods.slice. May 8 00:40:35.962000 audit[1466]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1466 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:40:35.962000 audit[1466]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe8743b220 a2=0 a3=7ffe8743b20c items=0 ppid=1450 pid=1466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:35.962000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 8 00:40:35.965000 audit[1471]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1471 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:40:35.965000 audit[1471]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffe6b440900 a2=0 a3=7ffe6b4408ec items=0 ppid=1450 pid=1471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:35.965000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 8 00:40:35.970781 systemd[1]: Created slice kubepods-burstable.slice. May 8 00:40:35.973827 systemd[1]: Created slice kubepods-besteffort.slice. May 8 00:40:35.980879 kubelet[1450]: I0508 00:40:35.980840 1450 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 8 00:40:35.981024 kubelet[1450]: I0508 00:40:35.980929 1450 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 8 00:40:35.981175 kubelet[1450]: I0508 00:40:35.981095 1450 eviction_manager.go:189] "Eviction manager: starting control loop" May 8 00:40:35.981175 kubelet[1450]: I0508 00:40:35.981123 1450 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 8 00:40:35.981477 kubelet[1450]: I0508 00:40:35.981439 1450 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 8 00:40:35.979000 audit[1450]: AVC avc: denied { mac_admin } for pid=1450 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:35.979000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 8 00:40:35.979000 audit[1450]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000dac120 a1=c00097c3f0 a2=c000dac0f0 a3=25 items=0 ppid=1 pid=1450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:35.979000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 8 00:40:35.982257 kubelet[1450]: E0508 00:40:35.982214 1450 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 8 00:40:35.982330 kubelet[1450]: E0508 00:40:35.982301 1450 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.33\" not found" May 8 00:40:35.971000 audit[1473]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1473 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:40:35.971000 audit[1473]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd8a42d1c0 a2=0 a3=7ffd8a42d1ac items=0 ppid=1450 pid=1473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:35.971000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 8 00:40:35.990000 audit[1478]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1478 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:40:35.990000 audit[1478]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd19aa5c00 a2=0 a3=7ffd19aa5bec items=0 ppid=1450 pid=1478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:35.990000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 8 00:40:36.032000 audit[1483]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1483 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:40:36.032000 audit[1483]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffc640ea510 a2=0 a3=7ffc640ea4fc items=0 ppid=1450 pid=1483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:36.032000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 8 00:40:36.034222 kubelet[1450]: I0508 00:40:36.034107 1450 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 8 00:40:36.034000 audit[1484]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1484 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:40:36.034000 audit[1484]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcd91af690 a2=0 a3=7ffcd91af67c items=0 ppid=1450 pid=1484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:36.034000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 8 00:40:36.034000 audit[1485]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1485 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:40:36.034000 audit[1485]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdb3d32e20 a2=0 a3=7ffdb3d32e0c items=0 ppid=1450 pid=1485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:36.034000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 8 00:40:36.035313 kubelet[1450]: I0508 00:40:36.035296 1450 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 8 00:40:36.035343 kubelet[1450]: I0508 00:40:36.035326 1450 status_manager.go:227] "Starting to sync pod status with apiserver" May 8 00:40:36.035378 kubelet[1450]: I0508 00:40:36.035366 1450 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 8 00:40:36.035401 kubelet[1450]: I0508 00:40:36.035380 1450 kubelet.go:2388] "Starting kubelet main sync loop" May 8 00:40:36.035554 kubelet[1450]: E0508 00:40:36.035529 1450 kubelet.go:2412] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" May 8 00:40:36.035000 audit[1486]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=1486 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:40:36.035000 audit[1486]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe5b37af50 a2=0 a3=7ffe5b37af3c items=0 ppid=1450 pid=1486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:36.035000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 8 00:40:36.035000 audit[1487]: NETFILTER_CFG table=mangle:10 family=10 entries=1 op=nft_register_chain pid=1487 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:40:36.035000 audit[1487]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd226daf20 a2=0 a3=7ffd226daf0c items=0 ppid=1450 pid=1487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:36.035000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 8 00:40:36.036000 audit[1488]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1488 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:40:36.036000 audit[1488]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff281a6a90 a2=0 a3=7fff281a6a7c items=0 ppid=1450 pid=1488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:36.036000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 8 00:40:36.037000 audit[1489]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=1489 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:40:36.037000 audit[1489]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffdcd840c30 a2=0 a3=7ffdcd840c1c items=0 ppid=1450 pid=1489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:36.037000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 8 00:40:36.038000 audit[1490]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1490 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:40:36.038000 audit[1490]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff0ef12fe0 a2=0 a3=7fff0ef12fcc items=0 ppid=1450 pid=1490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:36.038000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 8 00:40:36.082878 kubelet[1450]: I0508 00:40:36.082834 1450 kubelet_node_status.go:76] "Attempting to register node" node="10.0.0.33" May 8 00:40:36.173057 kubelet[1450]: I0508 00:40:36.172992 1450 kubelet_node_status.go:79] "Successfully registered node" node="10.0.0.33" May 8 00:40:36.173057 kubelet[1450]: E0508 00:40:36.173042 1450 kubelet_node_status.go:549] "Error updating node status, will retry" err="error getting node \"10.0.0.33\": node \"10.0.0.33\" not found" May 8 00:40:36.351589 kubelet[1450]: I0508 00:40:36.351456 1450 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" May 8 00:40:36.352059 env[1196]: time="2025-05-08T00:40:36.351963222Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 8 00:40:36.352367 kubelet[1450]: I0508 00:40:36.352230 1450 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" May 8 00:40:36.458706 sudo[1339]: pam_unix(sudo:session): session closed for user root May 8 00:40:36.457000 audit[1339]: USER_END pid=1339 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:40:36.457000 audit[1339]: CRED_DISP pid=1339 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 8 00:40:36.460410 sshd[1336]: pam_unix(sshd:session): session closed for user core May 8 00:40:36.460000 audit[1336]: USER_END pid=1336 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:36.460000 audit[1336]: CRED_DISP pid=1336 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 8 00:40:36.463167 systemd[1]: sshd@6-10.0.0.33:22-10.0.0.1:56918.service: Deactivated successfully. May 8 00:40:36.464021 systemd[1]: session-7.scope: Deactivated successfully. May 8 00:40:36.462000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.33:22-10.0.0.1:56918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 8 00:40:36.464776 systemd-logind[1186]: Session 7 logged out. Waiting for processes to exit. May 8 00:40:36.465488 systemd-logind[1186]: Removed session 7. May 8 00:40:36.674724 kubelet[1450]: I0508 00:40:36.674530 1450 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" May 8 00:40:36.675292 kubelet[1450]: W0508 00:40:36.674834 1450 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.CSIDriver ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 8 00:40:36.675292 kubelet[1450]: W0508 00:40:36.674880 1450 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 8 00:40:36.675292 kubelet[1450]: W0508 00:40:36.674877 1450 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.Service ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 8 00:40:36.797740 kubelet[1450]: E0508 00:40:36.797586 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:40:36.797740 kubelet[1450]: I0508 00:40:36.797692 1450 apiserver.go:52] "Watching apiserver" May 8 00:40:36.802699 kubelet[1450]: E0508 00:40:36.802587 1450 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-pm8mh" podUID="2800af31-37f6-43fa-b72f-454be6588432" May 8 00:40:36.809587 systemd[1]: Created slice kubepods-besteffort-pod9977a00a_cc3b_4168_a159_4c53e23ca16d.slice. May 8 00:40:36.821602 systemd[1]: Created slice kubepods-besteffort-pod7e7bace6_33f5_4d69_ad19_0f0727209c97.slice. May 8 00:40:36.841393 kubelet[1450]: I0508 00:40:36.841338 1450 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 8 00:40:36.847431 kubelet[1450]: I0508 00:40:36.847364 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/7e7bace6-33f5-4d69-ad19-0f0727209c97-var-run-calico\") pod \"calico-node-c8zlq\" (UID: \"7e7bace6-33f5-4d69-ad19-0f0727209c97\") " pod="calico-system/calico-node-c8zlq" May 8 00:40:36.847618 kubelet[1450]: I0508 00:40:36.847441 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2msxd\" (UniqueName: \"kubernetes.io/projected/9977a00a-cc3b-4168-a159-4c53e23ca16d-kube-api-access-2msxd\") pod \"kube-proxy-rxfmj\" (UID: \"9977a00a-cc3b-4168-a159-4c53e23ca16d\") " pod="kube-system/kube-proxy-rxfmj" May 8 00:40:36.847618 kubelet[1450]: I0508 00:40:36.847480 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/7e7bace6-33f5-4d69-ad19-0f0727209c97-policysync\") pod \"calico-node-c8zlq\" (UID: \"7e7bace6-33f5-4d69-ad19-0f0727209c97\") " pod="calico-system/calico-node-c8zlq" May 8 00:40:36.847618 kubelet[1450]: I0508 00:40:36.847506 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/7e7bace6-33f5-4d69-ad19-0f0727209c97-cni-net-dir\") pod \"calico-node-c8zlq\" (UID: \"7e7bace6-33f5-4d69-ad19-0f0727209c97\") " pod="calico-system/calico-node-c8zlq" May 8 00:40:36.847618 kubelet[1450]: I0508 00:40:36.847529 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/2800af31-37f6-43fa-b72f-454be6588432-varrun\") pod \"csi-node-driver-pm8mh\" (UID: \"2800af31-37f6-43fa-b72f-454be6588432\") " pod="calico-system/csi-node-driver-pm8mh" May 8 00:40:36.847618 kubelet[1450]: I0508 00:40:36.847553 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/7e7bace6-33f5-4d69-ad19-0f0727209c97-cni-log-dir\") pod \"calico-node-c8zlq\" (UID: \"7e7bace6-33f5-4d69-ad19-0f0727209c97\") " pod="calico-system/calico-node-c8zlq" May 8 00:40:36.847754 kubelet[1450]: I0508 00:40:36.847622 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/7e7bace6-33f5-4d69-ad19-0f0727209c97-flexvol-driver-host\") pod \"calico-node-c8zlq\" (UID: \"7e7bace6-33f5-4d69-ad19-0f0727209c97\") " pod="calico-system/calico-node-c8zlq" May 8 00:40:36.847754 kubelet[1450]: I0508 00:40:36.847651 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/2800af31-37f6-43fa-b72f-454be6588432-socket-dir\") pod \"csi-node-driver-pm8mh\" (UID: \"2800af31-37f6-43fa-b72f-454be6588432\") " pod="calico-system/csi-node-driver-pm8mh" May 8 00:40:36.847754 kubelet[1450]: I0508 00:40:36.847671 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/9977a00a-cc3b-4168-a159-4c53e23ca16d-kube-proxy\") pod \"kube-proxy-rxfmj\" (UID: \"9977a00a-cc3b-4168-a159-4c53e23ca16d\") " pod="kube-system/kube-proxy-rxfmj" May 8 00:40:36.847754 kubelet[1450]: I0508 00:40:36.847688 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/7e7bace6-33f5-4d69-ad19-0f0727209c97-node-certs\") pod \"calico-node-c8zlq\" (UID: \"7e7bace6-33f5-4d69-ad19-0f0727209c97\") " pod="calico-system/calico-node-c8zlq" May 8 00:40:36.847754 kubelet[1450]: I0508 00:40:36.847703 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/7e7bace6-33f5-4d69-ad19-0f0727209c97-var-lib-calico\") pod \"calico-node-c8zlq\" (UID: \"7e7bace6-33f5-4d69-ad19-0f0727209c97\") " pod="calico-system/calico-node-c8zlq" May 8 00:40:36.847865 kubelet[1450]: I0508 00:40:36.847715 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/7e7bace6-33f5-4d69-ad19-0f0727209c97-cni-bin-dir\") pod \"calico-node-c8zlq\" (UID: \"7e7bace6-33f5-4d69-ad19-0f0727209c97\") " pod="calico-system/calico-node-c8zlq" May 8 00:40:36.847865 kubelet[1450]: I0508 00:40:36.847734 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6db4j\" (UniqueName: \"kubernetes.io/projected/7e7bace6-33f5-4d69-ad19-0f0727209c97-kube-api-access-6db4j\") pod \"calico-node-c8zlq\" (UID: \"7e7bace6-33f5-4d69-ad19-0f0727209c97\") " pod="calico-system/calico-node-c8zlq" May 8 00:40:36.847865 kubelet[1450]: I0508 00:40:36.847751 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/2800af31-37f6-43fa-b72f-454be6588432-kubelet-dir\") pod \"csi-node-driver-pm8mh\" (UID: \"2800af31-37f6-43fa-b72f-454be6588432\") " pod="calico-system/csi-node-driver-pm8mh" May 8 00:40:36.847865 kubelet[1450]: I0508 00:40:36.847772 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/2800af31-37f6-43fa-b72f-454be6588432-registration-dir\") pod \"csi-node-driver-pm8mh\" (UID: \"2800af31-37f6-43fa-b72f-454be6588432\") " pod="calico-system/csi-node-driver-pm8mh" May 8 00:40:36.847865 kubelet[1450]: I0508 00:40:36.847787 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hwpnw\" (UniqueName: \"kubernetes.io/projected/2800af31-37f6-43fa-b72f-454be6588432-kube-api-access-hwpnw\") pod \"csi-node-driver-pm8mh\" (UID: \"2800af31-37f6-43fa-b72f-454be6588432\") " pod="calico-system/csi-node-driver-pm8mh" May 8 00:40:36.848008 kubelet[1450]: I0508 00:40:36.847800 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/9977a00a-cc3b-4168-a159-4c53e23ca16d-xtables-lock\") pod \"kube-proxy-rxfmj\" (UID: \"9977a00a-cc3b-4168-a159-4c53e23ca16d\") " pod="kube-system/kube-proxy-rxfmj" May 8 00:40:36.848008 kubelet[1450]: I0508 00:40:36.847813 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/7e7bace6-33f5-4d69-ad19-0f0727209c97-lib-modules\") pod \"calico-node-c8zlq\" (UID: \"7e7bace6-33f5-4d69-ad19-0f0727209c97\") " pod="calico-system/calico-node-c8zlq" May 8 00:40:36.848008 kubelet[1450]: I0508 00:40:36.847825 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/7e7bace6-33f5-4d69-ad19-0f0727209c97-xtables-lock\") pod \"calico-node-c8zlq\" (UID: \"7e7bace6-33f5-4d69-ad19-0f0727209c97\") " pod="calico-system/calico-node-c8zlq" May 8 00:40:36.848008 kubelet[1450]: I0508 00:40:36.847842 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/7e7bace6-33f5-4d69-ad19-0f0727209c97-tigera-ca-bundle\") pod \"calico-node-c8zlq\" (UID: \"7e7bace6-33f5-4d69-ad19-0f0727209c97\") " pod="calico-system/calico-node-c8zlq" May 8 00:40:36.848008 kubelet[1450]: I0508 00:40:36.847903 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/9977a00a-cc3b-4168-a159-4c53e23ca16d-lib-modules\") pod \"kube-proxy-rxfmj\" (UID: \"9977a00a-cc3b-4168-a159-4c53e23ca16d\") " pod="kube-system/kube-proxy-rxfmj" May 8 00:40:36.949994 kubelet[1450]: E0508 00:40:36.949839 1450 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:36.949994 kubelet[1450]: W0508 00:40:36.949867 1450 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:36.949994 kubelet[1450]: E0508 00:40:36.949906 1450 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:36.950298 kubelet[1450]: E0508 00:40:36.950124 1450 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:36.950298 kubelet[1450]: W0508 00:40:36.950133 1450 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:36.950298 kubelet[1450]: E0508 00:40:36.950143 1450 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:36.950298 kubelet[1450]: E0508 00:40:36.950263 1450 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:36.950298 kubelet[1450]: W0508 00:40:36.950272 1450 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:36.950298 kubelet[1450]: E0508 00:40:36.950282 1450 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:36.950526 kubelet[1450]: E0508 00:40:36.950418 1450 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:36.950526 kubelet[1450]: W0508 00:40:36.950427 1450 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:36.950526 kubelet[1450]: E0508 00:40:36.950446 1450 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:36.950618 kubelet[1450]: E0508 00:40:36.950606 1450 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:36.950618 kubelet[1450]: W0508 00:40:36.950615 1450 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:36.950677 kubelet[1450]: E0508 00:40:36.950625 1450 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:36.950804 kubelet[1450]: E0508 00:40:36.950786 1450 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:36.950804 kubelet[1450]: W0508 00:40:36.950800 1450 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:36.950948 kubelet[1450]: E0508 00:40:36.950815 1450 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:36.951031 kubelet[1450]: E0508 00:40:36.951017 1450 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:36.951074 kubelet[1450]: W0508 00:40:36.951032 1450 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:36.951110 kubelet[1450]: E0508 00:40:36.951073 1450 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:36.951217 kubelet[1450]: E0508 00:40:36.951194 1450 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:36.951217 kubelet[1450]: W0508 00:40:36.951216 1450 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:36.951394 kubelet[1450]: E0508 00:40:36.951258 1450 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:36.951432 kubelet[1450]: E0508 00:40:36.951402 1450 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:36.951432 kubelet[1450]: W0508 00:40:36.951413 1450 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:36.951508 kubelet[1450]: E0508 00:40:36.951446 1450 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:36.951649 kubelet[1450]: E0508 00:40:36.951637 1450 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:36.951649 kubelet[1450]: W0508 00:40:36.951647 1450 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:36.951726 kubelet[1450]: E0508 00:40:36.951691 1450 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:36.951794 kubelet[1450]: E0508 00:40:36.951780 1450 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:36.951851 kubelet[1450]: W0508 00:40:36.951797 1450 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:36.951851 kubelet[1450]: E0508 00:40:36.951821 1450 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:36.951993 kubelet[1450]: E0508 00:40:36.951976 1450 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:36.951993 kubelet[1450]: W0508 00:40:36.951988 1450 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:36.952091 kubelet[1450]: E0508 00:40:36.952015 1450 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:36.952196 kubelet[1450]: E0508 00:40:36.952178 1450 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:36.952196 kubelet[1450]: W0508 00:40:36.952192 1450 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:36.952256 kubelet[1450]: E0508 00:40:36.952208 1450 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:36.952407 kubelet[1450]: E0508 00:40:36.952382 1450 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:36.952407 kubelet[1450]: W0508 00:40:36.952393 1450 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:36.952407 kubelet[1450]: E0508 00:40:36.952407 1450 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:36.952592 kubelet[1450]: E0508 00:40:36.952577 1450 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:36.952629 kubelet[1450]: W0508 00:40:36.952592 1450 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:36.952629 kubelet[1450]: E0508 00:40:36.952610 1450 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:36.952822 kubelet[1450]: E0508 00:40:36.952807 1450 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:36.952822 kubelet[1450]: W0508 00:40:36.952818 1450 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:36.952926 kubelet[1450]: E0508 00:40:36.952831 1450 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:36.953093 kubelet[1450]: E0508 00:40:36.953073 1450 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:36.953093 kubelet[1450]: W0508 00:40:36.953089 1450 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:36.953187 kubelet[1450]: E0508 00:40:36.953106 1450 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:36.953326 kubelet[1450]: E0508 00:40:36.953306 1450 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:36.953326 kubelet[1450]: W0508 00:40:36.953321 1450 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:36.953411 kubelet[1450]: E0508 00:40:36.953336 1450 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:36.953655 kubelet[1450]: E0508 00:40:36.953626 1450 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:36.953655 kubelet[1450]: W0508 00:40:36.953643 1450 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:36.953767 kubelet[1450]: E0508 00:40:36.953658 1450 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:36.953933 kubelet[1450]: E0508 00:40:36.953909 1450 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:36.953933 kubelet[1450]: W0508 00:40:36.953929 1450 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:36.954045 kubelet[1450]: E0508 00:40:36.953960 1450 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:36.954160 kubelet[1450]: E0508 00:40:36.954147 1450 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:36.954201 kubelet[1450]: W0508 00:40:36.954159 1450 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:36.954201 kubelet[1450]: E0508 00:40:36.954189 1450 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:36.954292 kubelet[1450]: I0508 00:40:36.954270 1450 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 8 00:40:36.954340 kubelet[1450]: E0508 00:40:36.954328 1450 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:36.954372 kubelet[1450]: W0508 00:40:36.954342 1450 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:36.954404 kubelet[1450]: E0508 00:40:36.954392 1450 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:36.954538 kubelet[1450]: E0508 00:40:36.954519 1450 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:36.954538 kubelet[1450]: W0508 00:40:36.954535 1450 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:36.954621 kubelet[1450]: E0508 00:40:36.954555 1450 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:36.954713 kubelet[1450]: E0508 00:40:36.954698 1450 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:36.954713 kubelet[1450]: W0508 00:40:36.954708 1450 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:36.954783 kubelet[1450]: E0508 00:40:36.954736 1450 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:36.954885 kubelet[1450]: E0508 00:40:36.954869 1450 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:36.954885 kubelet[1450]: W0508 00:40:36.954881 1450 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:36.955000 kubelet[1450]: E0508 00:40:36.954905 1450 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:36.955147 kubelet[1450]: E0508 00:40:36.955125 1450 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:36.955147 kubelet[1450]: W0508 00:40:36.955138 1450 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:36.955239 kubelet[1450]: E0508 00:40:36.955158 1450 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:36.955361 kubelet[1450]: E0508 00:40:36.955346 1450 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:36.955361 kubelet[1450]: W0508 00:40:36.955359 1450 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:36.955425 kubelet[1450]: E0508 00:40:36.955373 1450 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:36.955582 kubelet[1450]: E0508 00:40:36.955550 1450 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:36.955582 kubelet[1450]: W0508 00:40:36.955578 1450 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:36.955705 kubelet[1450]: E0508 00:40:36.955590 1450 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:36.955880 kubelet[1450]: E0508 00:40:36.955862 1450 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:36.956015 kubelet[1450]: W0508 00:40:36.955992 1450 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:36.956125 kubelet[1450]: E0508 00:40:36.956104 1450 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:36.956268 kubelet[1450]: E0508 00:40:36.956255 1450 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:36.956268 kubelet[1450]: W0508 00:40:36.956265 1450 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:36.956362 kubelet[1450]: E0508 00:40:36.956348 1450 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:36.956488 kubelet[1450]: E0508 00:40:36.956471 1450 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:36.956488 kubelet[1450]: W0508 00:40:36.956486 1450 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:36.956590 kubelet[1450]: E0508 00:40:36.956561 1450 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:36.956664 kubelet[1450]: E0508 00:40:36.956649 1450 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:36.956664 kubelet[1450]: W0508 00:40:36.956659 1450 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:36.956786 kubelet[1450]: E0508 00:40:36.956734 1450 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:36.962908 kubelet[1450]: E0508 00:40:36.962866 1450 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:36.962908 kubelet[1450]: W0508 00:40:36.962883 1450 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:36.962908 kubelet[1450]: E0508 00:40:36.962915 1450 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:36.963270 kubelet[1450]: E0508 00:40:36.963236 1450 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:36.963270 kubelet[1450]: W0508 00:40:36.963261 1450 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:36.963457 kubelet[1450]: E0508 00:40:36.963301 1450 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:36.963502 kubelet[1450]: E0508 00:40:36.963480 1450 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:36.963502 kubelet[1450]: W0508 00:40:36.963490 1450 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:36.963630 kubelet[1450]: E0508 00:40:36.963606 1450 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:36.963822 kubelet[1450]: E0508 00:40:36.963806 1450 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:36.963822 kubelet[1450]: W0508 00:40:36.963819 1450 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:36.963948 kubelet[1450]: E0508 00:40:36.963904 1450 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:36.965226 kubelet[1450]: E0508 00:40:36.965201 1450 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:36.965325 kubelet[1450]: W0508 00:40:36.965306 1450 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:36.965535 kubelet[1450]: E0508 00:40:36.965512 1450 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:36.965796 kubelet[1450]: E0508 00:40:36.965777 1450 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:36.965796 kubelet[1450]: W0508 00:40:36.965791 1450 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:36.965925 kubelet[1450]: E0508 00:40:36.965828 1450 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:36.966057 kubelet[1450]: E0508 00:40:36.966038 1450 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:36.966057 kubelet[1450]: W0508 00:40:36.966054 1450 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:36.966193 kubelet[1450]: E0508 00:40:36.966084 1450 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:36.966264 kubelet[1450]: E0508 00:40:36.966246 1450 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:36.966264 kubelet[1450]: W0508 00:40:36.966260 1450 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:36.966351 kubelet[1450]: E0508 00:40:36.966284 1450 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:36.966508 kubelet[1450]: E0508 00:40:36.966484 1450 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:36.966508 kubelet[1450]: W0508 00:40:36.966504 1450 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:36.966643 kubelet[1450]: E0508 00:40:36.966582 1450 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:36.966999 kubelet[1450]: E0508 00:40:36.966961 1450 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:36.966999 kubelet[1450]: W0508 00:40:36.966994 1450 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:36.967103 kubelet[1450]: E0508 00:40:36.967008 1450 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:36.976716 kubelet[1450]: E0508 00:40:36.976655 1450 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 8 00:40:36.976716 kubelet[1450]: W0508 00:40:36.976682 1450 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 8 00:40:36.976716 kubelet[1450]: E0508 00:40:36.976707 1450 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 8 00:40:37.120385 kubelet[1450]: E0508 00:40:37.120320 1450 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:40:37.121341 env[1196]: time="2025-05-08T00:40:37.121274900Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-rxfmj,Uid:9977a00a-cc3b-4168-a159-4c53e23ca16d,Namespace:kube-system,Attempt:0,}" May 8 00:40:37.124488 kubelet[1450]: E0508 00:40:37.124454 1450 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:40:37.138409 env[1196]: time="2025-05-08T00:40:37.138348946Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-c8zlq,Uid:7e7bace6-33f5-4d69-ad19-0f0727209c97,Namespace:calico-system,Attempt:0,}" May 8 00:40:37.798142 kubelet[1450]: E0508 00:40:37.798021 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:40:38.036944 kubelet[1450]: E0508 00:40:38.036848 1450 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-pm8mh" podUID="2800af31-37f6-43fa-b72f-454be6588432" May 8 00:40:38.678483 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1229803544.mount: Deactivated successfully. May 8 00:40:38.798238 kubelet[1450]: E0508 00:40:38.798185 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:40:39.038449 env[1196]: time="2025-05-08T00:40:39.038305782Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:40:39.113826 env[1196]: time="2025-05-08T00:40:39.113750325Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:40:39.161121 env[1196]: time="2025-05-08T00:40:39.161050516Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:40:39.165962 env[1196]: time="2025-05-08T00:40:39.165920000Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:40:39.174821 env[1196]: time="2025-05-08T00:40:39.174759260Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:40:39.179874 env[1196]: time="2025-05-08T00:40:39.179807028Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:40:39.184429 env[1196]: time="2025-05-08T00:40:39.184333228Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:40:39.191261 env[1196]: time="2025-05-08T00:40:39.191180812Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:40:39.509162 env[1196]: time="2025-05-08T00:40:39.508752366Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:40:39.509162 env[1196]: time="2025-05-08T00:40:39.508832817Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:40:39.509162 env[1196]: time="2025-05-08T00:40:39.508846883Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:40:39.509384 env[1196]: time="2025-05-08T00:40:39.509318969Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8d90e96c3773551e293c027e87209074af821d86f77df683ced2628e9c73298c pid=1555 runtime=io.containerd.runc.v2 May 8 00:40:39.520587 env[1196]: time="2025-05-08T00:40:39.520505421Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:40:39.520587 env[1196]: time="2025-05-08T00:40:39.520546288Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:40:39.520897 env[1196]: time="2025-05-08T00:40:39.520557008Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:40:39.520897 env[1196]: time="2025-05-08T00:40:39.520860487Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a9c17354cdab04d286a22af7ce8a979cd10af100437fbf4864cef393c4ead0c1 pid=1565 runtime=io.containerd.runc.v2 May 8 00:40:39.526118 systemd[1]: Started cri-containerd-8d90e96c3773551e293c027e87209074af821d86f77df683ced2628e9c73298c.scope. May 8 00:40:39.541395 systemd[1]: Started cri-containerd-a9c17354cdab04d286a22af7ce8a979cd10af100437fbf4864cef393c4ead0c1.scope. May 8 00:40:39.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.625863 kernel: kauditd_printk_skb: 243 callbacks suppressed May 8 00:40:39.625932 kernel: audit: type=1400 audit(1746664839.618:432): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.625954 kernel: audit: type=1400 audit(1746664839.618:433): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.638290 kernel: audit: type=1400 audit(1746664839.618:434): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.641538 kernel: audit: type=1400 audit(1746664839.618:435): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.641729 kernel: audit: type=1400 audit(1746664839.618:436): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.647322 kernel: audit: type=1400 audit(1746664839.618:437): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.647358 kernel: audit: type=1400 audit(1746664839.618:438): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.653219 kernel: audit: type=1400 audit(1746664839.618:439): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.653284 kernel: audit: type=1400 audit(1746664839.618:440): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.658940 kernel: audit: type=1400 audit(1746664839.655:441): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.655000 audit: BPF prog-id=61 op=LOAD May 8 00:40:39.655000 audit[1568]: AVC avc: denied { bpf } for pid=1568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.655000 audit[1568]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1555 pid=1568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:39.655000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864393065393663333737333535316532393363303237653837323039 May 8 00:40:39.655000 audit[1568]: AVC avc: denied { perfmon } for pid=1568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.655000 audit[1568]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1555 pid=1568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:39.655000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864393065393663333737333535316532393363303237653837323039 May 8 00:40:39.655000 audit[1568]: AVC avc: denied { bpf } for pid=1568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.655000 audit[1568]: AVC avc: denied { bpf } for pid=1568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.655000 audit[1568]: AVC avc: denied { bpf } for pid=1568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.655000 audit[1568]: AVC avc: denied { perfmon } for pid=1568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.655000 audit[1568]: AVC avc: denied { perfmon } for pid=1568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.655000 audit[1568]: AVC avc: denied { perfmon } for pid=1568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.655000 audit[1568]: AVC avc: denied { perfmon } for pid=1568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.655000 audit[1568]: AVC avc: denied { perfmon } for pid=1568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.655000 audit[1568]: AVC avc: denied { bpf } for pid=1568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.655000 audit[1568]: AVC avc: denied { bpf } for pid=1568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.655000 audit: BPF prog-id=62 op=LOAD May 8 00:40:39.655000 audit[1568]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000315050 items=0 ppid=1555 pid=1568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:39.655000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864393065393663333737333535316532393363303237653837323039 May 8 00:40:39.658000 audit[1568]: AVC avc: denied { bpf } for pid=1568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.658000 audit[1568]: AVC avc: denied { bpf } for pid=1568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.658000 audit[1568]: AVC avc: denied { perfmon } for pid=1568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.658000 audit[1568]: AVC avc: denied { perfmon } for pid=1568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.658000 audit[1568]: AVC avc: denied { perfmon } for pid=1568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.658000 audit[1568]: AVC avc: denied { perfmon } for pid=1568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.658000 audit[1568]: AVC avc: denied { perfmon } for pid=1568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.658000 audit[1568]: AVC avc: denied { bpf } for pid=1568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.658000 audit[1568]: AVC avc: denied { bpf } for pid=1568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.658000 audit: BPF prog-id=63 op=LOAD May 8 00:40:39.658000 audit[1568]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000315098 items=0 ppid=1555 pid=1568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:39.658000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864393065393663333737333535316532393363303237653837323039 May 8 00:40:39.658000 audit: BPF prog-id=63 op=UNLOAD May 8 00:40:39.658000 audit: BPF prog-id=62 op=UNLOAD May 8 00:40:39.658000 audit[1568]: AVC avc: denied { bpf } for pid=1568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.658000 audit[1568]: AVC avc: denied { bpf } for pid=1568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.658000 audit[1568]: AVC avc: denied { bpf } for pid=1568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.658000 audit[1568]: AVC avc: denied { perfmon } for pid=1568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.658000 audit[1568]: AVC avc: denied { perfmon } for pid=1568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.658000 audit[1568]: AVC avc: denied { perfmon } for pid=1568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.658000 audit[1568]: AVC avc: denied { perfmon } for pid=1568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.658000 audit[1568]: AVC avc: denied { perfmon } for pid=1568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.658000 audit[1568]: AVC avc: denied { bpf } for pid=1568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.658000 audit[1568]: AVC avc: denied { bpf } for pid=1568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.658000 audit: BPF prog-id=64 op=LOAD May 8 00:40:39.658000 audit[1568]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003154a8 items=0 ppid=1555 pid=1568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:39.658000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864393065393663333737333535316532393363303237653837323039 May 8 00:40:39.672323 env[1196]: time="2025-05-08T00:40:39.672167616Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-c8zlq,Uid:7e7bace6-33f5-4d69-ad19-0f0727209c97,Namespace:calico-system,Attempt:0,} returns sandbox id \"8d90e96c3773551e293c027e87209074af821d86f77df683ced2628e9c73298c\"" May 8 00:40:39.673879 kubelet[1450]: E0508 00:40:39.673428 1450 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:40:39.677537 env[1196]: time="2025-05-08T00:40:39.677504837Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 8 00:40:39.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.677000 audit: BPF prog-id=65 op=LOAD May 8 00:40:39.678000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.678000 audit[1587]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1565 pid=1587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:39.678000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139633137333534636461623034643238366132326166376365386139 May 8 00:40:39.678000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.678000 audit[1587]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1565 pid=1587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:39.678000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139633137333534636461623034643238366132326166376365386139 May 8 00:40:39.678000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.678000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.678000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.678000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.678000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.678000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.678000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.678000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.678000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.678000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.678000 audit: BPF prog-id=66 op=LOAD May 8 00:40:39.678000 audit[1587]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0001ddce0 items=0 ppid=1565 pid=1587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:39.678000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139633137333534636461623034643238366132326166376365386139 May 8 00:40:39.678000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.678000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.678000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.678000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.678000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.678000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.678000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.678000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.678000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.678000 audit: BPF prog-id=67 op=LOAD May 8 00:40:39.678000 audit[1587]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0001ddd28 items=0 ppid=1565 pid=1587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:39.678000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139633137333534636461623034643238366132326166376365386139 May 8 00:40:39.678000 audit: BPF prog-id=67 op=UNLOAD May 8 00:40:39.678000 audit: BPF prog-id=66 op=UNLOAD May 8 00:40:39.678000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.678000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.678000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.678000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.678000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.678000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.678000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.678000 audit[1587]: AVC avc: denied { perfmon } for pid=1587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.678000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.678000 audit[1587]: AVC avc: denied { bpf } for pid=1587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:39.678000 audit: BPF prog-id=68 op=LOAD May 8 00:40:39.678000 audit[1587]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0003c4138 items=0 ppid=1565 pid=1587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:39.678000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139633137333534636461623034643238366132326166376365386139 May 8 00:40:39.688597 env[1196]: time="2025-05-08T00:40:39.688521712Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-rxfmj,Uid:9977a00a-cc3b-4168-a159-4c53e23ca16d,Namespace:kube-system,Attempt:0,} returns sandbox id \"a9c17354cdab04d286a22af7ce8a979cd10af100437fbf4864cef393c4ead0c1\"" May 8 00:40:39.689285 kubelet[1450]: E0508 00:40:39.689257 1450 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:40:39.798520 kubelet[1450]: E0508 00:40:39.798388 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:40:40.036263 kubelet[1450]: E0508 00:40:40.036211 1450 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-pm8mh" podUID="2800af31-37f6-43fa-b72f-454be6588432" May 8 00:40:40.799610 kubelet[1450]: E0508 00:40:40.799535 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:40:41.303173 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3295916423.mount: Deactivated successfully. May 8 00:40:41.656149 env[1196]: time="2025-05-08T00:40:41.655976595Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:40:41.729597 env[1196]: time="2025-05-08T00:40:41.729546240Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:40:41.799912 kubelet[1450]: E0508 00:40:41.799825 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:40:41.817436 env[1196]: time="2025-05-08T00:40:41.817360765Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:40:41.875608 env[1196]: time="2025-05-08T00:40:41.875533861Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:40:41.876154 env[1196]: time="2025-05-08T00:40:41.876125581Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5\"" May 8 00:40:41.877692 env[1196]: time="2025-05-08T00:40:41.877624773Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.4\"" May 8 00:40:41.878662 env[1196]: time="2025-05-08T00:40:41.878625811Z" level=info msg="CreateContainer within sandbox \"8d90e96c3773551e293c027e87209074af821d86f77df683ced2628e9c73298c\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 8 00:40:42.037059 kubelet[1450]: E0508 00:40:42.036858 1450 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-pm8mh" podUID="2800af31-37f6-43fa-b72f-454be6588432" May 8 00:40:42.800592 kubelet[1450]: E0508 00:40:42.800526 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:40:43.088976 env[1196]: time="2025-05-08T00:40:43.088803238Z" level=info msg="CreateContainer within sandbox \"8d90e96c3773551e293c027e87209074af821d86f77df683ced2628e9c73298c\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"c2f8e7e52df21a21e597018a22b29d401da90ceff72cc4355145998481673fdc\"" May 8 00:40:43.089618 env[1196]: time="2025-05-08T00:40:43.089541693Z" level=info msg="StartContainer for \"c2f8e7e52df21a21e597018a22b29d401da90ceff72cc4355145998481673fdc\"" May 8 00:40:43.167119 systemd[1]: run-containerd-runc-k8s.io-c2f8e7e52df21a21e597018a22b29d401da90ceff72cc4355145998481673fdc-runc.RE1K0a.mount: Deactivated successfully. May 8 00:40:43.169785 systemd[1]: Started cri-containerd-c2f8e7e52df21a21e597018a22b29d401da90ceff72cc4355145998481673fdc.scope. May 8 00:40:43.201000 audit[1632]: AVC avc: denied { perfmon } for pid=1632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:43.201000 audit[1632]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f8b727c7138 items=0 ppid=1555 pid=1632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:43.201000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332663865376535326466323161323165353937303138613232623239 May 8 00:40:43.201000 audit[1632]: AVC avc: denied { bpf } for pid=1632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:43.201000 audit[1632]: AVC avc: denied { bpf } for pid=1632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:43.201000 audit[1632]: AVC avc: denied { bpf } for pid=1632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:43.201000 audit[1632]: AVC avc: denied { perfmon } for pid=1632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:43.201000 audit[1632]: AVC avc: denied { perfmon } for pid=1632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:43.201000 audit[1632]: AVC avc: denied { perfmon } for pid=1632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:43.201000 audit[1632]: AVC avc: denied { perfmon } for pid=1632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:43.201000 audit[1632]: AVC avc: denied { perfmon } for pid=1632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:43.201000 audit[1632]: AVC avc: denied { bpf } for pid=1632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:43.201000 audit[1632]: AVC avc: denied { bpf } for pid=1632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:43.201000 audit: BPF prog-id=69 op=LOAD May 8 00:40:43.201000 audit[1632]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000182578 items=0 ppid=1555 pid=1632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:43.201000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332663865376535326466323161323165353937303138613232623239 May 8 00:40:43.201000 audit[1632]: AVC avc: denied { bpf } for pid=1632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:43.201000 audit[1632]: AVC avc: denied { bpf } for pid=1632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:43.201000 audit[1632]: AVC avc: denied { perfmon } for pid=1632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:43.201000 audit[1632]: AVC avc: denied { perfmon } for pid=1632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:43.201000 audit[1632]: AVC avc: denied { perfmon } for pid=1632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:43.201000 audit[1632]: AVC avc: denied { perfmon } for pid=1632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:43.201000 audit[1632]: AVC avc: denied { perfmon } for pid=1632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:43.201000 audit[1632]: AVC avc: denied { bpf } for pid=1632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:43.201000 audit[1632]: AVC avc: denied { bpf } for pid=1632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:43.201000 audit: BPF prog-id=70 op=LOAD May 8 00:40:43.201000 audit[1632]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001825c8 items=0 ppid=1555 pid=1632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:43.201000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332663865376535326466323161323165353937303138613232623239 May 8 00:40:43.201000 audit: BPF prog-id=70 op=UNLOAD May 8 00:40:43.201000 audit: BPF prog-id=69 op=UNLOAD May 8 00:40:43.201000 audit[1632]: AVC avc: denied { bpf } for pid=1632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:43.201000 audit[1632]: AVC avc: denied { bpf } for pid=1632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:43.201000 audit[1632]: AVC avc: denied { bpf } for pid=1632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:43.201000 audit[1632]: AVC avc: denied { perfmon } for pid=1632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:43.201000 audit[1632]: AVC avc: denied { perfmon } for pid=1632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:43.201000 audit[1632]: AVC avc: denied { perfmon } for pid=1632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:43.201000 audit[1632]: AVC avc: denied { perfmon } for pid=1632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:43.201000 audit[1632]: AVC avc: denied { perfmon } for pid=1632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:43.201000 audit[1632]: AVC avc: denied { bpf } for pid=1632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:43.201000 audit[1632]: AVC avc: denied { bpf } for pid=1632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:43.201000 audit: BPF prog-id=71 op=LOAD May 8 00:40:43.201000 audit[1632]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000182658 items=0 ppid=1555 pid=1632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:43.201000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332663865376535326466323161323165353937303138613232623239 May 8 00:40:43.226714 systemd[1]: cri-containerd-c2f8e7e52df21a21e597018a22b29d401da90ceff72cc4355145998481673fdc.scope: Deactivated successfully. May 8 00:40:43.233000 audit: BPF prog-id=71 op=UNLOAD May 8 00:40:43.485096 env[1196]: time="2025-05-08T00:40:43.484912536Z" level=info msg="StartContainer for \"c2f8e7e52df21a21e597018a22b29d401da90ceff72cc4355145998481673fdc\" returns successfully" May 8 00:40:43.507764 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c2f8e7e52df21a21e597018a22b29d401da90ceff72cc4355145998481673fdc-rootfs.mount: Deactivated successfully. May 8 00:40:43.801102 kubelet[1450]: E0508 00:40:43.800982 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:40:44.036442 kubelet[1450]: E0508 00:40:44.036400 1450 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-pm8mh" podUID="2800af31-37f6-43fa-b72f-454be6588432" May 8 00:40:44.055878 kubelet[1450]: E0508 00:40:44.055772 1450 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:40:44.179374 env[1196]: time="2025-05-08T00:40:44.179311900Z" level=info msg="shim disconnected" id=c2f8e7e52df21a21e597018a22b29d401da90ceff72cc4355145998481673fdc May 8 00:40:44.179374 env[1196]: time="2025-05-08T00:40:44.179372885Z" level=warning msg="cleaning up after shim disconnected" id=c2f8e7e52df21a21e597018a22b29d401da90ceff72cc4355145998481673fdc namespace=k8s.io May 8 00:40:44.179752 env[1196]: time="2025-05-08T00:40:44.179386009Z" level=info msg="cleaning up dead shim" May 8 00:40:44.187167 env[1196]: time="2025-05-08T00:40:44.187091713Z" level=warning msg="cleanup warnings time=\"2025-05-08T00:40:44Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1677 runtime=io.containerd.runc.v2\n" May 8 00:40:44.802081 kubelet[1450]: E0508 00:40:44.802017 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:40:45.058517 kubelet[1450]: E0508 00:40:45.058367 1450 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:40:45.803140 kubelet[1450]: E0508 00:40:45.803082 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:40:46.037018 kubelet[1450]: E0508 00:40:46.036915 1450 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-pm8mh" podUID="2800af31-37f6-43fa-b72f-454be6588432" May 8 00:40:46.630233 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1590451773.mount: Deactivated successfully. May 8 00:40:46.803931 kubelet[1450]: E0508 00:40:46.803849 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:40:47.796845 env[1196]: time="2025-05-08T00:40:47.796759097Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:40:47.801060 env[1196]: time="2025-05-08T00:40:47.800961109Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:608f0c8bf7f9651ca79f170235ea5eefb978a0c1da132e7477a88ad37d171ad3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:40:47.803843 env[1196]: time="2025-05-08T00:40:47.803772853Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:40:47.805104 kubelet[1450]: E0508 00:40:47.805054 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:40:47.805638 env[1196]: time="2025-05-08T00:40:47.805576306Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:152638222ecf265eb8e5352e3c50e8fc520994e8ffcff1ee1490c975f7fc2b36,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:40:47.806150 env[1196]: time="2025-05-08T00:40:47.806111891Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.4\" returns image reference \"sha256:608f0c8bf7f9651ca79f170235ea5eefb978a0c1da132e7477a88ad37d171ad3\"" May 8 00:40:47.807235 env[1196]: time="2025-05-08T00:40:47.807205131Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 8 00:40:47.808212 env[1196]: time="2025-05-08T00:40:47.808184999Z" level=info msg="CreateContainer within sandbox \"a9c17354cdab04d286a22af7ce8a979cd10af100437fbf4864cef393c4ead0c1\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 8 00:40:47.828117 env[1196]: time="2025-05-08T00:40:47.828019834Z" level=info msg="CreateContainer within sandbox \"a9c17354cdab04d286a22af7ce8a979cd10af100437fbf4864cef393c4ead0c1\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"b63c172f11a8960f316401aa24f26f03173303dc2613b2b8dec0aa3cbb212c99\"" May 8 00:40:47.828908 env[1196]: time="2025-05-08T00:40:47.828871040Z" level=info msg="StartContainer for \"b63c172f11a8960f316401aa24f26f03173303dc2613b2b8dec0aa3cbb212c99\"" May 8 00:40:47.868245 systemd[1]: Started cri-containerd-b63c172f11a8960f316401aa24f26f03173303dc2613b2b8dec0aa3cbb212c99.scope. May 8 00:40:47.871646 systemd[1]: run-containerd-runc-k8s.io-b63c172f11a8960f316401aa24f26f03173303dc2613b2b8dec0aa3cbb212c99-runc.kZP4wE.mount: Deactivated successfully. May 8 00:40:47.964000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.967027 kernel: kauditd_printk_skb: 148 callbacks suppressed May 8 00:40:47.967095 kernel: audit: type=1400 audit(1746664847.964:475): avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.964000 audit[1696]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f72483b22c8 items=0 ppid=1565 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.988120 kernel: audit: type=1300 audit(1746664847.964:475): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f72483b22c8 items=0 ppid=1565 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.988269 kernel: audit: type=1327 audit(1746664847.964:475): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236336331373266313161383936306633313634303161613234663236 May 8 00:40:47.964000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236336331373266313161383936306633313634303161613234663236 May 8 00:40:47.964000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.996379 kernel: audit: type=1400 audit(1746664847.964:476): avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.996447 kernel: audit: type=1400 audit(1746664847.964:476): avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.964000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.999891 kernel: audit: type=1400 audit(1746664847.964:476): avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.964000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:48.003322 kernel: audit: type=1400 audit(1746664847.964:476): avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.964000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:48.006896 kernel: audit: type=1400 audit(1746664847.964:476): avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.964000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.964000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:48.013928 kernel: audit: type=1400 audit(1746664847.964:476): avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:48.014059 kernel: audit: type=1400 audit(1746664847.964:476): avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.964000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.964000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.964000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.964000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.964000 audit: BPF prog-id=72 op=LOAD May 8 00:40:47.964000 audit[1696]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00033ccd8 items=0 ppid=1565 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.964000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236336331373266313161383936306633313634303161613234663236 May 8 00:40:47.965000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.965000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.965000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.965000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.965000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.965000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.965000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.965000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.965000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.965000 audit: BPF prog-id=73 op=LOAD May 8 00:40:47.965000 audit[1696]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00033cd28 items=0 ppid=1565 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236336331373266313161383936306633313634303161613234663236 May 8 00:40:47.987000 audit: BPF prog-id=73 op=UNLOAD May 8 00:40:47.987000 audit: BPF prog-id=72 op=UNLOAD May 8 00:40:47.987000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.987000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.987000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.987000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.987000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.987000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.987000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.987000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.987000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.987000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:47.987000 audit: BPF prog-id=74 op=LOAD May 8 00:40:47.987000 audit[1696]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00033cdb8 items=0 ppid=1565 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:47.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236336331373266313161383936306633313634303161613234663236 May 8 00:40:48.036459 kubelet[1450]: E0508 00:40:48.036400 1450 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-pm8mh" podUID="2800af31-37f6-43fa-b72f-454be6588432" May 8 00:40:48.133604 env[1196]: time="2025-05-08T00:40:48.133397916Z" level=info msg="StartContainer for \"b63c172f11a8960f316401aa24f26f03173303dc2613b2b8dec0aa3cbb212c99\" returns successfully" May 8 00:40:48.161000 audit[1756]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1756 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:40:48.161000 audit[1756]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcfd2e8e30 a2=0 a3=7ffcfd2e8e1c items=0 ppid=1707 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:48.161000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 8 00:40:48.162000 audit[1757]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1757 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:40:48.162000 audit[1757]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe3d7d7500 a2=0 a3=7ffe3d7d74ec items=0 ppid=1707 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:48.162000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 8 00:40:48.164000 audit[1761]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=1761 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:40:48.164000 audit[1761]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeb7b13320 a2=0 a3=7ffeb7b1330c items=0 ppid=1707 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:48.164000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 8 00:40:48.165000 audit[1762]: NETFILTER_CFG table=nat:17 family=10 entries=1 op=nft_register_chain pid=1762 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:40:48.165000 audit[1762]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff6a4c8260 a2=0 a3=7fff6a4c824c items=0 ppid=1707 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:48.165000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 8 00:40:48.166000 audit[1763]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=1763 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:40:48.166000 audit[1763]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffce388cfd0 a2=0 a3=7ffce388cfbc items=0 ppid=1707 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:48.166000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 8 00:40:48.166000 audit[1764]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1764 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:40:48.166000 audit[1764]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff5e974ff0 a2=0 a3=7fff5e974fdc items=0 ppid=1707 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:48.166000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 8 00:40:48.265000 audit[1765]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1765 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:40:48.265000 audit[1765]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff3fad53f0 a2=0 a3=7fff3fad53dc items=0 ppid=1707 pid=1765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:48.265000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 8 00:40:48.267000 audit[1767]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1767 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:40:48.267000 audit[1767]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffcae48ef50 a2=0 a3=7ffcae48ef3c items=0 ppid=1707 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:48.267000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 8 00:40:48.271000 audit[1770]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1770 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:40:48.271000 audit[1770]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffefaaa9f50 a2=0 a3=7ffefaaa9f3c items=0 ppid=1707 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:48.271000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 8 00:40:48.271000 audit[1771]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1771 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:40:48.271000 audit[1771]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd8ba69d60 a2=0 a3=7ffd8ba69d4c items=0 ppid=1707 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:48.271000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 8 00:40:48.274000 audit[1773]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1773 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:40:48.274000 audit[1773]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc804e23a0 a2=0 a3=7ffc804e238c items=0 ppid=1707 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:48.274000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 8 00:40:48.275000 audit[1774]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1774 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:40:48.275000 audit[1774]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffb2f8ec10 a2=0 a3=7fffb2f8ebfc items=0 ppid=1707 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:48.275000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 8 00:40:48.277000 audit[1776]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1776 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:40:48.277000 audit[1776]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdd82fbac0 a2=0 a3=7ffdd82fbaac items=0 ppid=1707 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:48.277000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 8 00:40:48.280000 audit[1779]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1779 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:40:48.280000 audit[1779]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc1e9e87d0 a2=0 a3=7ffc1e9e87bc items=0 ppid=1707 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:48.280000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 8 00:40:48.281000 audit[1780]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1780 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:40:48.281000 audit[1780]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc3a84c940 a2=0 a3=7ffc3a84c92c items=0 ppid=1707 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:48.281000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 8 00:40:48.283000 audit[1782]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1782 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:40:48.283000 audit[1782]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffc766baa0 a2=0 a3=7fffc766ba8c items=0 ppid=1707 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:48.283000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 8 00:40:48.284000 audit[1783]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1783 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:40:48.284000 audit[1783]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdfdafce40 a2=0 a3=7ffdfdafce2c items=0 ppid=1707 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:48.284000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 8 00:40:48.286000 audit[1785]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1785 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:40:48.286000 audit[1785]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd05579c30 a2=0 a3=7ffd05579c1c items=0 ppid=1707 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:48.286000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 8 00:40:48.290000 audit[1788]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1788 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:40:48.290000 audit[1788]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdfac03c00 a2=0 a3=7ffdfac03bec items=0 ppid=1707 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:48.290000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 8 00:40:48.293000 audit[1791]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1791 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:40:48.293000 audit[1791]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc22221150 a2=0 a3=7ffc2222113c items=0 ppid=1707 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:48.293000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 8 00:40:48.293000 audit[1792]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1792 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:40:48.293000 audit[1792]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff9a922e20 a2=0 a3=7fff9a922e0c items=0 ppid=1707 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:48.293000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 8 00:40:48.295000 audit[1794]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1794 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:40:48.295000 audit[1794]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc6b93b9a0 a2=0 a3=7ffc6b93b98c items=0 ppid=1707 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:48.295000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 8 00:40:48.314000 audit[1798]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1798 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:40:48.314000 audit[1798]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc42649d90 a2=0 a3=7ffc42649d7c items=0 ppid=1707 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:48.314000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 8 00:40:48.315000 audit[1799]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1799 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:40:48.315000 audit[1799]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffef0d29360 a2=0 a3=7ffef0d2934c items=0 ppid=1707 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:48.315000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 8 00:40:48.317000 audit[1801]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1801 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 8 00:40:48.317000 audit[1801]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff6675ee90 a2=0 a3=7fff6675ee7c items=0 ppid=1707 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:48.317000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 8 00:40:48.454000 audit[1807]: NETFILTER_CFG table=filter:39 family=2 entries=9 op=nft_register_rule pid=1807 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:40:48.454000 audit[1807]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffd206d5990 a2=0 a3=7ffd206d597c items=0 ppid=1707 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:48.454000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:40:48.481000 audit[1807]: NETFILTER_CFG table=nat:40 family=2 entries=21 op=nft_register_chain pid=1807 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:40:48.481000 audit[1807]: SYSCALL arch=c000003e syscall=46 success=yes exit=9084 a0=3 a1=7ffd206d5990 a2=0 a3=7ffd206d597c items=0 ppid=1707 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:48.481000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:40:48.483000 audit[1814]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1814 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:40:48.483000 audit[1814]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffee3469920 a2=0 a3=7ffee346990c items=0 ppid=1707 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:48.483000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 8 00:40:48.486000 audit[1816]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1816 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:40:48.486000 audit[1816]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc1df671a0 a2=0 a3=7ffc1df6718c items=0 ppid=1707 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:48.486000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 8 00:40:48.489000 audit[1819]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1819 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:40:48.489000 audit[1819]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcbd4b6840 a2=0 a3=7ffcbd4b682c items=0 ppid=1707 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:48.489000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 8 00:40:48.490000 audit[1820]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1820 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:40:48.490000 audit[1820]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff3d350b60 a2=0 a3=7fff3d350b4c items=0 ppid=1707 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:48.490000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 8 00:40:48.493000 audit[1822]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1822 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:40:48.493000 audit[1822]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc9a9c6aa0 a2=0 a3=7ffc9a9c6a8c items=0 ppid=1707 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:48.493000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 8 00:40:48.494000 audit[1823]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1823 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:40:48.494000 audit[1823]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff8662f9a0 a2=0 a3=7fff8662f98c items=0 ppid=1707 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:48.494000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 8 00:40:48.496000 audit[1825]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1825 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:40:48.496000 audit[1825]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdcb9d8740 a2=0 a3=7ffdcb9d872c items=0 ppid=1707 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:48.496000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 8 00:40:48.500000 audit[1828]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1828 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:40:48.500000 audit[1828]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fff06329080 a2=0 a3=7fff0632906c items=0 ppid=1707 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:48.500000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 8 00:40:48.501000 audit[1829]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1829 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:40:48.501000 audit[1829]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd650b60d0 a2=0 a3=7ffd650b60bc items=0 ppid=1707 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:48.501000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 8 00:40:48.503000 audit[1831]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1831 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:40:48.503000 audit[1831]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdb8e5fe60 a2=0 a3=7ffdb8e5fe4c items=0 ppid=1707 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:48.503000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 8 00:40:48.504000 audit[1832]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1832 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:40:48.504000 audit[1832]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc28f8df80 a2=0 a3=7ffc28f8df6c items=0 ppid=1707 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:48.504000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 8 00:40:48.507000 audit[1834]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1834 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:40:48.507000 audit[1834]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd3d350070 a2=0 a3=7ffd3d35005c items=0 ppid=1707 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:48.507000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 8 00:40:48.510000 audit[1837]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1837 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:40:48.510000 audit[1837]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd8db72950 a2=0 a3=7ffd8db7293c items=0 ppid=1707 pid=1837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:48.510000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 8 00:40:48.513000 audit[1840]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1840 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:40:48.513000 audit[1840]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff766c3bd0 a2=0 a3=7fff766c3bbc items=0 ppid=1707 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:48.513000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 8 00:40:48.514000 audit[1841]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1841 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:40:48.514000 audit[1841]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdd6040220 a2=0 a3=7ffdd604020c items=0 ppid=1707 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:48.514000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 8 00:40:48.516000 audit[1843]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1843 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:40:48.516000 audit[1843]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc951b2800 a2=0 a3=7ffc951b27ec items=0 ppid=1707 pid=1843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:48.516000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 8 00:40:48.519000 audit[1846]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1846 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:40:48.519000 audit[1846]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffcc1141bb0 a2=0 a3=7ffcc1141b9c items=0 ppid=1707 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:48.519000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 8 00:40:48.520000 audit[1847]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1847 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:40:48.520000 audit[1847]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc702a5d40 a2=0 a3=7ffc702a5d2c items=0 ppid=1707 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:48.520000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 8 00:40:48.522000 audit[1849]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1849 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:40:48.522000 audit[1849]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffce883efb0 a2=0 a3=7ffce883ef9c items=0 ppid=1707 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:48.522000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 8 00:40:48.523000 audit[1850]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1850 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:40:48.523000 audit[1850]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeb5b9a7c0 a2=0 a3=7ffeb5b9a7ac items=0 ppid=1707 pid=1850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:48.523000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 8 00:40:48.525000 audit[1852]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1852 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:40:48.525000 audit[1852]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffce6c29cd0 a2=0 a3=7ffce6c29cbc items=0 ppid=1707 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:48.525000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 8 00:40:48.528000 audit[1855]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1855 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 8 00:40:48.528000 audit[1855]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc0b05f080 a2=0 a3=7ffc0b05f06c items=0 ppid=1707 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:48.528000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 8 00:40:48.531000 audit[1857]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1857 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 8 00:40:48.531000 audit[1857]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffe60d74590 a2=0 a3=7ffe60d7457c items=0 ppid=1707 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:48.531000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:40:48.531000 audit[1857]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1857 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 8 00:40:48.531000 audit[1857]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffe60d74590 a2=0 a3=7ffe60d7457c items=0 ppid=1707 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:48.531000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:40:48.805613 kubelet[1450]: E0508 00:40:48.805420 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:40:49.138640 kubelet[1450]: E0508 00:40:49.138504 1450 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:40:49.500959 kubelet[1450]: I0508 00:40:49.500762 1450 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-rxfmj" podStartSLOduration=5.383604493 podStartE2EDuration="13.500739758s" podCreationTimestamp="2025-05-08 00:40:36 +0000 UTC" firstStartedPulling="2025-05-08 00:40:39.689861475 +0000 UTC m=+5.519801992" lastFinishedPulling="2025-05-08 00:40:47.80699673 +0000 UTC m=+13.636937257" observedRunningTime="2025-05-08 00:40:49.500423134 +0000 UTC m=+15.330363661" watchObservedRunningTime="2025-05-08 00:40:49.500739758 +0000 UTC m=+15.330680285" May 8 00:40:49.806487 kubelet[1450]: E0508 00:40:49.806353 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:40:50.036842 kubelet[1450]: E0508 00:40:50.036773 1450 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-pm8mh" podUID="2800af31-37f6-43fa-b72f-454be6588432" May 8 00:40:50.139671 kubelet[1450]: E0508 00:40:50.139560 1450 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:40:50.807007 kubelet[1450]: E0508 00:40:50.806932 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:40:51.807838 kubelet[1450]: E0508 00:40:51.807796 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:40:52.036376 kubelet[1450]: E0508 00:40:52.036332 1450 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-pm8mh" podUID="2800af31-37f6-43fa-b72f-454be6588432" May 8 00:40:52.809118 kubelet[1450]: E0508 00:40:52.809045 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:40:53.809594 kubelet[1450]: E0508 00:40:53.809451 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:40:54.036474 kubelet[1450]: E0508 00:40:54.036377 1450 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-pm8mh" podUID="2800af31-37f6-43fa-b72f-454be6588432" May 8 00:40:54.178000 audit[1859]: NETFILTER_CFG table=filter:65 family=2 entries=16 op=nft_register_rule pid=1859 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:40:54.180916 kernel: kauditd_printk_skb: 186 callbacks suppressed May 8 00:40:54.181013 kernel: audit: type=1325 audit(1746664854.178:532): table=filter:65 family=2 entries=16 op=nft_register_rule pid=1859 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:40:54.178000 audit[1859]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffcb64cb880 a2=0 a3=7ffcb64cb86c items=0 ppid=1707 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:54.191761 kernel: audit: type=1300 audit(1746664854.178:532): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffcb64cb880 a2=0 a3=7ffcb64cb86c items=0 ppid=1707 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:54.191979 kernel: audit: type=1327 audit(1746664854.178:532): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:40:54.178000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:40:54.201029 kernel: audit: type=1325 audit(1746664854.195:533): table=nat:66 family=2 entries=14 op=nft_register_rule pid=1859 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:40:54.195000 audit[1859]: NETFILTER_CFG table=nat:66 family=2 entries=14 op=nft_register_rule pid=1859 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:40:54.195000 audit[1859]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffcb64cb880 a2=0 a3=0 items=0 ppid=1707 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:54.195000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:40:54.211835 kernel: audit: type=1300 audit(1746664854.195:533): arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffcb64cb880 a2=0 a3=0 items=0 ppid=1707 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:54.211902 kernel: audit: type=1327 audit(1746664854.195:533): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:40:54.227000 audit[1863]: NETFILTER_CFG table=filter:67 family=2 entries=16 op=nft_register_rule pid=1863 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:40:54.227000 audit[1863]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffcb9022b20 a2=0 a3=7ffcb9022b0c items=0 ppid=1707 pid=1863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:54.236215 kernel: audit: type=1325 audit(1746664854.227:534): table=filter:67 family=2 entries=16 op=nft_register_rule pid=1863 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:40:54.236413 kernel: audit: type=1300 audit(1746664854.227:534): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffcb9022b20 a2=0 a3=7ffcb9022b0c items=0 ppid=1707 pid=1863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:54.236481 kernel: audit: type=1327 audit(1746664854.227:534): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:40:54.227000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:40:54.241000 audit[1863]: NETFILTER_CFG table=nat:68 family=2 entries=14 op=nft_register_rule pid=1863 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:40:54.241000 audit[1863]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffcb9022b20 a2=0 a3=0 items=0 ppid=1707 pid=1863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:54.241000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:40:54.246005 kernel: audit: type=1325 audit(1746664854.241:535): table=nat:68 family=2 entries=14 op=nft_register_rule pid=1863 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:40:54.810255 kubelet[1450]: E0508 00:40:54.810181 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:40:55.178000 audit[1865]: NETFILTER_CFG table=filter:69 family=2 entries=13 op=nft_register_rule pid=1865 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:40:55.178000 audit[1865]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fffb24b0aa0 a2=0 a3=7fffb24b0a8c items=0 ppid=1707 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:55.178000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:40:55.184000 audit[1865]: NETFILTER_CFG table=nat:70 family=2 entries=35 op=nft_register_chain pid=1865 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:40:55.184000 audit[1865]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7fffb24b0aa0 a2=0 a3=7fffb24b0a8c items=0 ppid=1707 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:55.184000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:40:55.797800 kubelet[1450]: E0508 00:40:55.797737 1450 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:40:55.811138 kubelet[1450]: E0508 00:40:55.811068 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:40:56.036606 kubelet[1450]: E0508 00:40:56.036491 1450 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-pm8mh" podUID="2800af31-37f6-43fa-b72f-454be6588432" May 8 00:40:56.198000 audit[1867]: NETFILTER_CFG table=filter:71 family=2 entries=10 op=nft_register_rule pid=1867 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:40:56.198000 audit[1867]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffdefce35a0 a2=0 a3=7ffdefce358c items=0 ppid=1707 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:56.198000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:40:56.207000 audit[1867]: NETFILTER_CFG table=nat:72 family=2 entries=56 op=nft_register_chain pid=1867 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:40:56.207000 audit[1867]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffdefce35a0 a2=0 a3=7ffdefce358c items=0 ppid=1707 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:56.207000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:40:56.811284 kubelet[1450]: E0508 00:40:56.811176 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:40:57.217000 audit[1870]: NETFILTER_CFG table=filter:73 family=2 entries=10 op=nft_register_rule pid=1870 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:40:57.217000 audit[1870]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffd690d3fd0 a2=0 a3=7ffd690d3fbc items=0 ppid=1707 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:57.217000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:40:57.222000 audit[1870]: NETFILTER_CFG table=nat:74 family=2 entries=20 op=nft_register_rule pid=1870 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:40:57.222000 audit[1870]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd690d3fd0 a2=0 a3=7ffd690d3fbc items=0 ppid=1707 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:57.222000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:40:57.786347 env[1196]: time="2025-05-08T00:40:57.786249295Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:40:57.788630 env[1196]: time="2025-05-08T00:40:57.788510805Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:40:57.790995 env[1196]: time="2025-05-08T00:40:57.790897575Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:40:57.792829 env[1196]: time="2025-05-08T00:40:57.792773537Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:40:57.793524 env[1196]: time="2025-05-08T00:40:57.793463848Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9\"" May 8 00:40:57.796447 env[1196]: time="2025-05-08T00:40:57.796405140Z" level=info msg="CreateContainer within sandbox \"8d90e96c3773551e293c027e87209074af821d86f77df683ced2628e9c73298c\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 8 00:40:57.811925 kubelet[1450]: E0508 00:40:57.811855 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:40:57.821163 env[1196]: time="2025-05-08T00:40:57.821064464Z" level=info msg="CreateContainer within sandbox \"8d90e96c3773551e293c027e87209074af821d86f77df683ced2628e9c73298c\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"e1fe60bc553396b2c956fcc4014f8f3e63f1f87c1e0bd4cc26faddf781a21f43\"" May 8 00:40:57.821839 env[1196]: time="2025-05-08T00:40:57.821804941Z" level=info msg="StartContainer for \"e1fe60bc553396b2c956fcc4014f8f3e63f1f87c1e0bd4cc26faddf781a21f43\"" May 8 00:40:57.856169 systemd[1]: Started cri-containerd-e1fe60bc553396b2c956fcc4014f8f3e63f1f87c1e0bd4cc26faddf781a21f43.scope. May 8 00:40:57.888000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:57.888000 audit[1878]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f1530efbf88 items=0 ppid=1555 pid=1878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:57.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531666536306263353533333936623263393536666363343031346638 May 8 00:40:57.888000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:57.888000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:57.888000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:57.888000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:57.888000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:57.888000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:57.888000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:57.888000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:57.888000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:57.888000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:57.888000 audit: BPF prog-id=75 op=LOAD May 8 00:40:57.888000 audit[1878]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001fcf58 items=0 ppid=1555 pid=1878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:57.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531666536306263353533333936623263393536666363343031346638 May 8 00:40:57.888000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:57.888000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:57.888000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:57.888000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:57.888000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:57.888000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:57.888000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:57.888000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:57.888000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:57.888000 audit: BPF prog-id=76 op=LOAD May 8 00:40:57.888000 audit[1878]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001fcfa8 items=0 ppid=1555 pid=1878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:57.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531666536306263353533333936623263393536666363343031346638 May 8 00:40:57.888000 audit: BPF prog-id=76 op=UNLOAD May 8 00:40:57.888000 audit: BPF prog-id=75 op=UNLOAD May 8 00:40:57.888000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:57.888000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:57.888000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:57.888000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:57.888000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:57.888000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:57.888000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:57.888000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:57.888000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:57.888000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:40:57.888000 audit: BPF prog-id=77 op=LOAD May 8 00:40:57.888000 audit[1878]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001fd038 items=0 ppid=1555 pid=1878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:40:57.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531666536306263353533333936623263393536666363343031346638 May 8 00:40:57.915791 env[1196]: time="2025-05-08T00:40:57.915744903Z" level=info msg="StartContainer for \"e1fe60bc553396b2c956fcc4014f8f3e63f1f87c1e0bd4cc26faddf781a21f43\" returns successfully" May 8 00:40:58.036613 kubelet[1450]: E0508 00:40:58.036472 1450 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-pm8mh" podUID="2800af31-37f6-43fa-b72f-454be6588432" May 8 00:40:58.155021 kubelet[1450]: E0508 00:40:58.154985 1450 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:40:58.812999 kubelet[1450]: E0508 00:40:58.812917 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:40:59.156436 kubelet[1450]: E0508 00:40:59.156313 1450 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:40:59.814034 kubelet[1450]: E0508 00:40:59.813940 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:40:59.836145 systemd[1]: cri-containerd-e1fe60bc553396b2c956fcc4014f8f3e63f1f87c1e0bd4cc26faddf781a21f43.scope: Deactivated successfully. May 8 00:40:59.839000 audit: BPF prog-id=77 op=UNLOAD May 8 00:40:59.841185 kernel: kauditd_printk_skb: 63 callbacks suppressed May 8 00:40:59.841257 kernel: audit: type=1334 audit(1746664859.839:548): prog-id=77 op=UNLOAD May 8 00:40:59.859727 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e1fe60bc553396b2c956fcc4014f8f3e63f1f87c1e0bd4cc26faddf781a21f43-rootfs.mount: Deactivated successfully. May 8 00:40:59.875404 kubelet[1450]: I0508 00:40:59.875355 1450 kubelet_node_status.go:502] "Fast updating node status as it just became ready" May 8 00:41:00.041424 systemd[1]: Created slice kubepods-besteffort-pod2800af31_37f6_43fa_b72f_454be6588432.slice. May 8 00:41:00.043119 env[1196]: time="2025-05-08T00:41:00.043076765Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-pm8mh,Uid:2800af31-37f6-43fa-b72f-454be6588432,Namespace:calico-system,Attempt:0,}" May 8 00:41:00.707177 env[1196]: time="2025-05-08T00:41:00.707077356Z" level=info msg="shim disconnected" id=e1fe60bc553396b2c956fcc4014f8f3e63f1f87c1e0bd4cc26faddf781a21f43 May 8 00:41:00.707177 env[1196]: time="2025-05-08T00:41:00.707160214Z" level=warning msg="cleaning up after shim disconnected" id=e1fe60bc553396b2c956fcc4014f8f3e63f1f87c1e0bd4cc26faddf781a21f43 namespace=k8s.io May 8 00:41:00.707177 env[1196]: time="2025-05-08T00:41:00.707180512Z" level=info msg="cleaning up dead shim" May 8 00:41:00.756824 env[1196]: time="2025-05-08T00:41:00.756761403Z" level=warning msg="cleanup warnings time=\"2025-05-08T00:41:00Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1918 runtime=io.containerd.runc.v2\n" May 8 00:41:00.814506 kubelet[1450]: E0508 00:41:00.814427 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:00.817689 env[1196]: time="2025-05-08T00:41:00.817562378Z" level=error msg="Failed to destroy network for sandbox \"7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:41:00.818296 env[1196]: time="2025-05-08T00:41:00.818219902Z" level=error msg="encountered an error cleaning up failed sandbox \"7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:41:00.818423 env[1196]: time="2025-05-08T00:41:00.818341233Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-pm8mh,Uid:2800af31-37f6-43fa-b72f-454be6588432,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:41:00.818838 kubelet[1450]: E0508 00:41:00.818718 1450 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:41:00.819172 kubelet[1450]: E0508 00:41:00.818891 1450 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-pm8mh" May 8 00:41:00.819172 kubelet[1450]: E0508 00:41:00.818930 1450 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-pm8mh" May 8 00:41:00.819172 kubelet[1450]: E0508 00:41:00.819052 1450 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-pm8mh_calico-system(2800af31-37f6-43fa-b72f-454be6588432)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-pm8mh_calico-system(2800af31-37f6-43fa-b72f-454be6588432)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-pm8mh" podUID="2800af31-37f6-43fa-b72f-454be6588432" May 8 00:41:00.820231 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e-shm.mount: Deactivated successfully. May 8 00:41:01.162818 kubelet[1450]: E0508 00:41:01.162769 1450 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:41:01.163507 env[1196]: time="2025-05-08T00:41:01.163470004Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 8 00:41:01.163923 kubelet[1450]: I0508 00:41:01.163882 1450 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e" May 8 00:41:01.164546 env[1196]: time="2025-05-08T00:41:01.164508944Z" level=info msg="StopPodSandbox for \"7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e\"" May 8 00:41:01.191602 env[1196]: time="2025-05-08T00:41:01.191492218Z" level=error msg="StopPodSandbox for \"7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e\" failed" error="failed to destroy network for sandbox \"7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:41:01.191900 kubelet[1450]: E0508 00:41:01.191846 1450 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e" May 8 00:41:01.191997 kubelet[1450]: E0508 00:41:01.191936 1450 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e"} May 8 00:41:01.192041 kubelet[1450]: E0508 00:41:01.192023 1450 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"2800af31-37f6-43fa-b72f-454be6588432\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 8 00:41:01.192135 kubelet[1450]: E0508 00:41:01.192048 1450 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"2800af31-37f6-43fa-b72f-454be6588432\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-pm8mh" podUID="2800af31-37f6-43fa-b72f-454be6588432" May 8 00:41:01.815663 kubelet[1450]: E0508 00:41:01.815605 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:02.816157 kubelet[1450]: E0508 00:41:02.816085 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:03.779934 systemd[1]: Created slice kubepods-besteffort-pode6df658e_6f40_435e_a1c0_431211d0175d.slice. May 8 00:41:03.817113 kubelet[1450]: E0508 00:41:03.817052 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:03.850650 kubelet[1450]: I0508 00:41:03.850552 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jpv66\" (UniqueName: \"kubernetes.io/projected/e6df658e-6f40-435e-a1c0-431211d0175d-kube-api-access-jpv66\") pod \"nginx-deployment-7fcdb87857-jhz2q\" (UID: \"e6df658e-6f40-435e-a1c0-431211d0175d\") " pod="default/nginx-deployment-7fcdb87857-jhz2q" May 8 00:41:04.383198 env[1196]: time="2025-05-08T00:41:04.383132315Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-jhz2q,Uid:e6df658e-6f40-435e-a1c0-431211d0175d,Namespace:default,Attempt:0,}" May 8 00:41:04.506739 env[1196]: time="2025-05-08T00:41:04.506655620Z" level=error msg="Failed to destroy network for sandbox \"91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:41:04.508932 env[1196]: time="2025-05-08T00:41:04.507116497Z" level=error msg="encountered an error cleaning up failed sandbox \"91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:41:04.508932 env[1196]: time="2025-05-08T00:41:04.507194655Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-jhz2q,Uid:e6df658e-6f40-435e-a1c0-431211d0175d,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:41:04.508293 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e-shm.mount: Deactivated successfully. May 8 00:41:04.509128 kubelet[1450]: E0508 00:41:04.507476 1450 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:41:04.509128 kubelet[1450]: E0508 00:41:04.507554 1450 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-jhz2q" May 8 00:41:04.509128 kubelet[1450]: E0508 00:41:04.507595 1450 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-jhz2q" May 8 00:41:04.509225 kubelet[1450]: E0508 00:41:04.507650 1450 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-7fcdb87857-jhz2q_default(e6df658e-6f40-435e-a1c0-431211d0175d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-7fcdb87857-jhz2q_default(e6df658e-6f40-435e-a1c0-431211d0175d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-jhz2q" podUID="e6df658e-6f40-435e-a1c0-431211d0175d" May 8 00:41:04.817493 kubelet[1450]: E0508 00:41:04.817300 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:05.171817 kubelet[1450]: I0508 00:41:05.171686 1450 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e" May 8 00:41:05.172427 env[1196]: time="2025-05-08T00:41:05.172386379Z" level=info msg="StopPodSandbox for \"91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e\"" May 8 00:41:05.197981 env[1196]: time="2025-05-08T00:41:05.197878075Z" level=error msg="StopPodSandbox for \"91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e\" failed" error="failed to destroy network for sandbox \"91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 8 00:41:05.198255 kubelet[1450]: E0508 00:41:05.198198 1450 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e" May 8 00:41:05.198312 kubelet[1450]: E0508 00:41:05.198284 1450 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e"} May 8 00:41:05.198357 kubelet[1450]: E0508 00:41:05.198339 1450 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e6df658e-6f40-435e-a1c0-431211d0175d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 8 00:41:05.198442 kubelet[1450]: E0508 00:41:05.198374 1450 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e6df658e-6f40-435e-a1c0-431211d0175d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-jhz2q" podUID="e6df658e-6f40-435e-a1c0-431211d0175d" May 8 00:41:05.578000 audit[2054]: NETFILTER_CFG table=filter:75 family=2 entries=10 op=nft_register_rule pid=2054 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:41:05.578000 audit[2054]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffe3606c200 a2=0 a3=7ffe3606c1ec items=0 ppid=1707 pid=2054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:05.586456 kernel: audit: type=1325 audit(1746664865.578:549): table=filter:75 family=2 entries=10 op=nft_register_rule pid=2054 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:41:05.586657 kernel: audit: type=1300 audit(1746664865.578:549): arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffe3606c200 a2=0 a3=7ffe3606c1ec items=0 ppid=1707 pid=2054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:05.586697 kernel: audit: type=1327 audit(1746664865.578:549): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:41:05.578000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:41:05.589000 audit[2054]: NETFILTER_CFG table=nat:76 family=2 entries=20 op=nft_register_rule pid=2054 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:41:05.589000 audit[2054]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe3606c200 a2=0 a3=7ffe3606c1ec items=0 ppid=1707 pid=2054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:05.598693 kernel: audit: type=1325 audit(1746664865.589:550): table=nat:76 family=2 entries=20 op=nft_register_rule pid=2054 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:41:05.598793 kernel: audit: type=1300 audit(1746664865.589:550): arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe3606c200 a2=0 a3=7ffe3606c1ec items=0 ppid=1707 pid=2054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:05.598824 kernel: audit: type=1327 audit(1746664865.589:550): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:41:05.589000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:41:05.817997 kubelet[1450]: E0508 00:41:05.817908 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:06.689167 update_engine[1187]: I0508 00:41:06.689071 1187 update_attempter.cc:509] Updating boot flags... May 8 00:41:06.818205 kubelet[1450]: E0508 00:41:06.818046 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:07.818693 kubelet[1450]: E0508 00:41:07.818611 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:08.819150 kubelet[1450]: E0508 00:41:08.819080 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:09.820154 kubelet[1450]: E0508 00:41:09.820062 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:10.820758 kubelet[1450]: E0508 00:41:10.820674 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:11.208256 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3129903999.mount: Deactivated successfully. May 8 00:41:11.821222 kubelet[1450]: E0508 00:41:11.821148 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:11.900085 env[1196]: time="2025-05-08T00:41:11.900008711Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:41:11.980238 env[1196]: time="2025-05-08T00:41:11.980121423Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:41:12.010818 env[1196]: time="2025-05-08T00:41:12.010723192Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:41:12.017769 env[1196]: time="2025-05-08T00:41:12.017712995Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:41:12.018334 env[1196]: time="2025-05-08T00:41:12.018291860Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae\"" May 8 00:41:12.025804 env[1196]: time="2025-05-08T00:41:12.025751602Z" level=info msg="CreateContainer within sandbox \"8d90e96c3773551e293c027e87209074af821d86f77df683ced2628e9c73298c\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 8 00:41:12.256341 env[1196]: time="2025-05-08T00:41:12.256156223Z" level=info msg="CreateContainer within sandbox \"8d90e96c3773551e293c027e87209074af821d86f77df683ced2628e9c73298c\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"050b36f95a30cc929736119c3b269e9a61f2aff9da0ec8ac435f2bf906490303\"" May 8 00:41:12.257316 env[1196]: time="2025-05-08T00:41:12.257272202Z" level=info msg="StartContainer for \"050b36f95a30cc929736119c3b269e9a61f2aff9da0ec8ac435f2bf906490303\"" May 8 00:41:12.279847 systemd[1]: Started cri-containerd-050b36f95a30cc929736119c3b269e9a61f2aff9da0ec8ac435f2bf906490303.scope. May 8 00:41:12.301000 audit[2079]: AVC avc: denied { perfmon } for pid=2079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:12.301000 audit[2079]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f08410414d8 items=0 ppid=1555 pid=2079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:12.314633 kernel: audit: type=1400 audit(1746664872.301:551): avc: denied { perfmon } for pid=2079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:12.314719 kernel: audit: type=1300 audit(1746664872.301:551): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f08410414d8 items=0 ppid=1555 pid=2079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:12.314745 kernel: audit: type=1327 audit(1746664872.301:551): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035306233366639356133306363393239373336313139633362323639 May 8 00:41:12.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035306233366639356133306363393239373336313139633362323639 May 8 00:41:12.301000 audit[2079]: AVC avc: denied { bpf } for pid=2079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:12.324085 kernel: audit: type=1400 audit(1746664872.301:552): avc: denied { bpf } for pid=2079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:12.324157 kernel: audit: type=1400 audit(1746664872.301:552): avc: denied { bpf } for pid=2079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:12.301000 audit[2079]: AVC avc: denied { bpf } for pid=2079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:12.328099 kernel: audit: type=1400 audit(1746664872.301:552): avc: denied { bpf } for pid=2079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:12.301000 audit[2079]: AVC avc: denied { bpf } for pid=2079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:12.301000 audit[2079]: AVC avc: denied { perfmon } for pid=2079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:12.333950 kernel: audit: type=1400 audit(1746664872.301:552): avc: denied { perfmon } for pid=2079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:12.335195 kernel: audit: type=1400 audit(1746664872.301:552): avc: denied { perfmon } for pid=2079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:12.301000 audit[2079]: AVC avc: denied { perfmon } for pid=2079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:12.301000 audit[2079]: AVC avc: denied { perfmon } for pid=2079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:12.340273 kernel: audit: type=1400 audit(1746664872.301:552): avc: denied { perfmon } for pid=2079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:12.340319 kernel: audit: type=1400 audit(1746664872.301:552): avc: denied { perfmon } for pid=2079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:12.301000 audit[2079]: AVC avc: denied { perfmon } for pid=2079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:12.301000 audit[2079]: AVC avc: denied { perfmon } for pid=2079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:12.301000 audit[2079]: AVC avc: denied { bpf } for pid=2079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:12.301000 audit[2079]: AVC avc: denied { bpf } for pid=2079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:12.301000 audit: BPF prog-id=78 op=LOAD May 8 00:41:12.301000 audit[2079]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000234e48 items=0 ppid=1555 pid=2079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:12.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035306233366639356133306363393239373336313139633362323639 May 8 00:41:12.306000 audit[2079]: AVC avc: denied { bpf } for pid=2079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:12.306000 audit[2079]: AVC avc: denied { bpf } for pid=2079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:12.306000 audit[2079]: AVC avc: denied { perfmon } for pid=2079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:12.306000 audit[2079]: AVC avc: denied { perfmon } for pid=2079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:12.306000 audit[2079]: AVC avc: denied { perfmon } for pid=2079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:12.306000 audit[2079]: AVC avc: denied { perfmon } for pid=2079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:12.306000 audit[2079]: AVC avc: denied { perfmon } for pid=2079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:12.306000 audit[2079]: AVC avc: denied { bpf } for pid=2079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:12.306000 audit[2079]: AVC avc: denied { bpf } for pid=2079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:12.306000 audit: BPF prog-id=79 op=LOAD May 8 00:41:12.306000 audit[2079]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000234e98 items=0 ppid=1555 pid=2079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:12.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035306233366639356133306363393239373336313139633362323639 May 8 00:41:12.313000 audit: BPF prog-id=79 op=UNLOAD May 8 00:41:12.313000 audit: BPF prog-id=78 op=UNLOAD May 8 00:41:12.313000 audit[2079]: AVC avc: denied { bpf } for pid=2079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:12.313000 audit[2079]: AVC avc: denied { bpf } for pid=2079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:12.313000 audit[2079]: AVC avc: denied { bpf } for pid=2079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:12.313000 audit[2079]: AVC avc: denied { perfmon } for pid=2079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:12.313000 audit[2079]: AVC avc: denied { perfmon } for pid=2079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:12.313000 audit[2079]: AVC avc: denied { perfmon } for pid=2079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:12.313000 audit[2079]: AVC avc: denied { perfmon } for pid=2079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:12.313000 audit[2079]: AVC avc: denied { perfmon } for pid=2079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:12.313000 audit[2079]: AVC avc: denied { bpf } for pid=2079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:12.313000 audit[2079]: AVC avc: denied { bpf } for pid=2079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:12.313000 audit: BPF prog-id=80 op=LOAD May 8 00:41:12.313000 audit[2079]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000234f28 items=0 ppid=1555 pid=2079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:12.313000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035306233366639356133306363393239373336313139633362323639 May 8 00:41:12.367854 env[1196]: time="2025-05-08T00:41:12.367783494Z" level=info msg="StartContainer for \"050b36f95a30cc929736119c3b269e9a61f2aff9da0ec8ac435f2bf906490303\" returns successfully" May 8 00:41:12.455312 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 8 00:41:12.455460 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 8 00:41:12.821383 kubelet[1450]: E0508 00:41:12.821290 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:13.036848 env[1196]: time="2025-05-08T00:41:13.036784661Z" level=info msg="StopPodSandbox for \"7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e\"" May 8 00:41:13.173242 env[1196]: 2025-05-08 00:41:13.123 [INFO][2157] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e" May 8 00:41:13.173242 env[1196]: 2025-05-08 00:41:13.123 [INFO][2157] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e" iface="eth0" netns="/var/run/netns/cni-a2f48233-ae0d-ea15-96a5-9b9cedcd917d" May 8 00:41:13.173242 env[1196]: 2025-05-08 00:41:13.123 [INFO][2157] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e" iface="eth0" netns="/var/run/netns/cni-a2f48233-ae0d-ea15-96a5-9b9cedcd917d" May 8 00:41:13.173242 env[1196]: 2025-05-08 00:41:13.124 [INFO][2157] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e" iface="eth0" netns="/var/run/netns/cni-a2f48233-ae0d-ea15-96a5-9b9cedcd917d" May 8 00:41:13.173242 env[1196]: 2025-05-08 00:41:13.124 [INFO][2157] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e" May 8 00:41:13.173242 env[1196]: 2025-05-08 00:41:13.124 [INFO][2157] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e" May 8 00:41:13.173242 env[1196]: 2025-05-08 00:41:13.160 [INFO][2166] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e" HandleID="k8s-pod-network.7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e" Workload="10.0.0.33-k8s-csi--node--driver--pm8mh-eth0" May 8 00:41:13.173242 env[1196]: 2025-05-08 00:41:13.160 [INFO][2166] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:41:13.173242 env[1196]: 2025-05-08 00:41:13.160 [INFO][2166] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:41:13.173242 env[1196]: 2025-05-08 00:41:13.167 [WARNING][2166] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e" HandleID="k8s-pod-network.7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e" Workload="10.0.0.33-k8s-csi--node--driver--pm8mh-eth0" May 8 00:41:13.173242 env[1196]: 2025-05-08 00:41:13.167 [INFO][2166] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e" HandleID="k8s-pod-network.7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e" Workload="10.0.0.33-k8s-csi--node--driver--pm8mh-eth0" May 8 00:41:13.173242 env[1196]: 2025-05-08 00:41:13.169 [INFO][2166] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:41:13.173242 env[1196]: 2025-05-08 00:41:13.171 [INFO][2157] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e" May 8 00:41:13.173719 env[1196]: time="2025-05-08T00:41:13.173337428Z" level=info msg="TearDown network for sandbox \"7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e\" successfully" May 8 00:41:13.173719 env[1196]: time="2025-05-08T00:41:13.173382002Z" level=info msg="StopPodSandbox for \"7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e\" returns successfully" May 8 00:41:13.174745 env[1196]: time="2025-05-08T00:41:13.174683532Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-pm8mh,Uid:2800af31-37f6-43fa-b72f-454be6588432,Namespace:calico-system,Attempt:1,}" May 8 00:41:13.175466 systemd[1]: run-netns-cni\x2da2f48233\x2dae0d\x2dea15\x2d96a5\x2d9b9cedcd917d.mount: Deactivated successfully. May 8 00:41:13.191796 kubelet[1450]: E0508 00:41:13.191766 1450 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:41:13.552936 systemd-networkd[1022]: cali1616c835726: Link UP May 8 00:41:13.556203 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 8 00:41:13.556275 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1616c835726: link becomes ready May 8 00:41:13.556247 systemd-networkd[1022]: cali1616c835726: Gained carrier May 8 00:41:13.606567 kubelet[1450]: I0508 00:41:13.606442 1450 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-c8zlq" podStartSLOduration=5.26429241 podStartE2EDuration="37.606416914s" podCreationTimestamp="2025-05-08 00:40:36 +0000 UTC" firstStartedPulling="2025-05-08 00:40:39.677009849 +0000 UTC m=+5.506950376" lastFinishedPulling="2025-05-08 00:41:12.019134353 +0000 UTC m=+37.849074880" observedRunningTime="2025-05-08 00:41:13.207077352 +0000 UTC m=+39.037017889" watchObservedRunningTime="2025-05-08 00:41:13.606416914 +0000 UTC m=+39.436357441" May 8 00:41:13.608177 env[1196]: 2025-05-08 00:41:13.215 [INFO][2175] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 8 00:41:13.608177 env[1196]: 2025-05-08 00:41:13.228 [INFO][2175] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.33-k8s-csi--node--driver--pm8mh-eth0 csi-node-driver- calico-system 2800af31-37f6-43fa-b72f-454be6588432 1132 0 2025-05-08 00:40:36 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:5b5cc68cd5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.0.0.33 csi-node-driver-pm8mh eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali1616c835726 [] []}} ContainerID="b09d620f71eddb24ddbd19f438c29fc9454a101cd4fc1aae55ed60b8e0df1583" Namespace="calico-system" Pod="csi-node-driver-pm8mh" WorkloadEndpoint="10.0.0.33-k8s-csi--node--driver--pm8mh-" May 8 00:41:13.608177 env[1196]: 2025-05-08 00:41:13.228 [INFO][2175] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="b09d620f71eddb24ddbd19f438c29fc9454a101cd4fc1aae55ed60b8e0df1583" Namespace="calico-system" Pod="csi-node-driver-pm8mh" WorkloadEndpoint="10.0.0.33-k8s-csi--node--driver--pm8mh-eth0" May 8 00:41:13.608177 env[1196]: 2025-05-08 00:41:13.263 [INFO][2213] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b09d620f71eddb24ddbd19f438c29fc9454a101cd4fc1aae55ed60b8e0df1583" HandleID="k8s-pod-network.b09d620f71eddb24ddbd19f438c29fc9454a101cd4fc1aae55ed60b8e0df1583" Workload="10.0.0.33-k8s-csi--node--driver--pm8mh-eth0" May 8 00:41:13.608177 env[1196]: 2025-05-08 00:41:13.416 [INFO][2213] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b09d620f71eddb24ddbd19f438c29fc9454a101cd4fc1aae55ed60b8e0df1583" HandleID="k8s-pod-network.b09d620f71eddb24ddbd19f438c29fc9454a101cd4fc1aae55ed60b8e0df1583" Workload="10.0.0.33-k8s-csi--node--driver--pm8mh-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000051330), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.33", "pod":"csi-node-driver-pm8mh", "timestamp":"2025-05-08 00:41:13.263890795 +0000 UTC"}, Hostname:"10.0.0.33", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 8 00:41:13.608177 env[1196]: 2025-05-08 00:41:13.416 [INFO][2213] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:41:13.608177 env[1196]: 2025-05-08 00:41:13.416 [INFO][2213] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:41:13.608177 env[1196]: 2025-05-08 00:41:13.417 [INFO][2213] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.33' May 8 00:41:13.608177 env[1196]: 2025-05-08 00:41:13.449 [INFO][2213] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b09d620f71eddb24ddbd19f438c29fc9454a101cd4fc1aae55ed60b8e0df1583" host="10.0.0.33" May 8 00:41:13.608177 env[1196]: 2025-05-08 00:41:13.476 [INFO][2213] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.33" May 8 00:41:13.608177 env[1196]: 2025-05-08 00:41:13.481 [INFO][2213] ipam/ipam.go 489: Trying affinity for 192.168.91.128/26 host="10.0.0.33" May 8 00:41:13.608177 env[1196]: 2025-05-08 00:41:13.483 [INFO][2213] ipam/ipam.go 155: Attempting to load block cidr=192.168.91.128/26 host="10.0.0.33" May 8 00:41:13.608177 env[1196]: 2025-05-08 00:41:13.485 [INFO][2213] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.91.128/26 host="10.0.0.33" May 8 00:41:13.608177 env[1196]: 2025-05-08 00:41:13.485 [INFO][2213] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.91.128/26 handle="k8s-pod-network.b09d620f71eddb24ddbd19f438c29fc9454a101cd4fc1aae55ed60b8e0df1583" host="10.0.0.33" May 8 00:41:13.608177 env[1196]: 2025-05-08 00:41:13.487 [INFO][2213] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.b09d620f71eddb24ddbd19f438c29fc9454a101cd4fc1aae55ed60b8e0df1583 May 8 00:41:13.608177 env[1196]: 2025-05-08 00:41:13.537 [INFO][2213] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.91.128/26 handle="k8s-pod-network.b09d620f71eddb24ddbd19f438c29fc9454a101cd4fc1aae55ed60b8e0df1583" host="10.0.0.33" May 8 00:41:13.608177 env[1196]: 2025-05-08 00:41:13.542 [INFO][2213] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.91.129/26] block=192.168.91.128/26 handle="k8s-pod-network.b09d620f71eddb24ddbd19f438c29fc9454a101cd4fc1aae55ed60b8e0df1583" host="10.0.0.33" May 8 00:41:13.608177 env[1196]: 2025-05-08 00:41:13.542 [INFO][2213] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.91.129/26] handle="k8s-pod-network.b09d620f71eddb24ddbd19f438c29fc9454a101cd4fc1aae55ed60b8e0df1583" host="10.0.0.33" May 8 00:41:13.608177 env[1196]: 2025-05-08 00:41:13.542 [INFO][2213] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:41:13.608177 env[1196]: 2025-05-08 00:41:13.542 [INFO][2213] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.91.129/26] IPv6=[] ContainerID="b09d620f71eddb24ddbd19f438c29fc9454a101cd4fc1aae55ed60b8e0df1583" HandleID="k8s-pod-network.b09d620f71eddb24ddbd19f438c29fc9454a101cd4fc1aae55ed60b8e0df1583" Workload="10.0.0.33-k8s-csi--node--driver--pm8mh-eth0" May 8 00:41:13.609019 env[1196]: 2025-05-08 00:41:13.544 [INFO][2175] cni-plugin/k8s.go 386: Populated endpoint ContainerID="b09d620f71eddb24ddbd19f438c29fc9454a101cd4fc1aae55ed60b8e0df1583" Namespace="calico-system" Pod="csi-node-driver-pm8mh" WorkloadEndpoint="10.0.0.33-k8s-csi--node--driver--pm8mh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.33-k8s-csi--node--driver--pm8mh-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"2800af31-37f6-43fa-b72f-454be6588432", ResourceVersion:"1132", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 40, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.33", ContainerID:"", Pod:"csi-node-driver-pm8mh", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.91.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali1616c835726", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:41:13.609019 env[1196]: 2025-05-08 00:41:13.544 [INFO][2175] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.91.129/32] ContainerID="b09d620f71eddb24ddbd19f438c29fc9454a101cd4fc1aae55ed60b8e0df1583" Namespace="calico-system" Pod="csi-node-driver-pm8mh" WorkloadEndpoint="10.0.0.33-k8s-csi--node--driver--pm8mh-eth0" May 8 00:41:13.609019 env[1196]: 2025-05-08 00:41:13.544 [INFO][2175] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali1616c835726 ContainerID="b09d620f71eddb24ddbd19f438c29fc9454a101cd4fc1aae55ed60b8e0df1583" Namespace="calico-system" Pod="csi-node-driver-pm8mh" WorkloadEndpoint="10.0.0.33-k8s-csi--node--driver--pm8mh-eth0" May 8 00:41:13.609019 env[1196]: 2025-05-08 00:41:13.556 [INFO][2175] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b09d620f71eddb24ddbd19f438c29fc9454a101cd4fc1aae55ed60b8e0df1583" Namespace="calico-system" Pod="csi-node-driver-pm8mh" WorkloadEndpoint="10.0.0.33-k8s-csi--node--driver--pm8mh-eth0" May 8 00:41:13.609019 env[1196]: 2025-05-08 00:41:13.556 [INFO][2175] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="b09d620f71eddb24ddbd19f438c29fc9454a101cd4fc1aae55ed60b8e0df1583" Namespace="calico-system" Pod="csi-node-driver-pm8mh" WorkloadEndpoint="10.0.0.33-k8s-csi--node--driver--pm8mh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.33-k8s-csi--node--driver--pm8mh-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"2800af31-37f6-43fa-b72f-454be6588432", ResourceVersion:"1132", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 40, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.33", ContainerID:"b09d620f71eddb24ddbd19f438c29fc9454a101cd4fc1aae55ed60b8e0df1583", Pod:"csi-node-driver-pm8mh", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.91.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali1616c835726", MAC:"d2:ae:d9:39:ee:e0", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:41:13.609019 env[1196]: 2025-05-08 00:41:13.606 [INFO][2175] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="b09d620f71eddb24ddbd19f438c29fc9454a101cd4fc1aae55ed60b8e0df1583" Namespace="calico-system" Pod="csi-node-driver-pm8mh" WorkloadEndpoint="10.0.0.33-k8s-csi--node--driver--pm8mh-eth0" May 8 00:41:13.638808 env[1196]: time="2025-05-08T00:41:13.638672844Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:41:13.638808 env[1196]: time="2025-05-08T00:41:13.638713210Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:41:13.638808 env[1196]: time="2025-05-08T00:41:13.638723579Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:41:13.639277 env[1196]: time="2025-05-08T00:41:13.639191223Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b09d620f71eddb24ddbd19f438c29fc9454a101cd4fc1aae55ed60b8e0df1583 pid=2242 runtime=io.containerd.runc.v2 May 8 00:41:13.654108 systemd[1]: run-containerd-runc-k8s.io-b09d620f71eddb24ddbd19f438c29fc9454a101cd4fc1aae55ed60b8e0df1583-runc.NvatDm.mount: Deactivated successfully. May 8 00:41:13.658849 systemd[1]: Started cri-containerd-b09d620f71eddb24ddbd19f438c29fc9454a101cd4fc1aae55ed60b8e0df1583.scope. May 8 00:41:13.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.670000 audit: BPF prog-id=81 op=LOAD May 8 00:41:13.670000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.670000 audit[2253]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2242 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:13.670000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230396436323066373165646462323464646264313966343338633239 May 8 00:41:13.670000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.670000 audit[2253]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2242 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:13.670000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230396436323066373165646462323464646264313966343338633239 May 8 00:41:13.670000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.670000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.670000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.670000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.670000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.670000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.670000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.670000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.670000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.670000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.670000 audit: BPF prog-id=82 op=LOAD May 8 00:41:13.670000 audit[2253]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c000209790 items=0 ppid=2242 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:13.670000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230396436323066373165646462323464646264313966343338633239 May 8 00:41:13.670000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.670000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.670000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.670000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.670000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.670000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.670000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.670000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.670000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.670000 audit: BPF prog-id=83 op=LOAD May 8 00:41:13.670000 audit[2253]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0002097d8 items=0 ppid=2242 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:13.670000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230396436323066373165646462323464646264313966343338633239 May 8 00:41:13.670000 audit: BPF prog-id=83 op=UNLOAD May 8 00:41:13.670000 audit: BPF prog-id=82 op=UNLOAD May 8 00:41:13.670000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.670000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.670000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.670000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.670000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.670000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.670000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.670000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.670000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.670000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.670000 audit: BPF prog-id=84 op=LOAD May 8 00:41:13.670000 audit[2253]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c000209be8 items=0 ppid=2242 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:13.670000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230396436323066373165646462323464646264313966343338633239 May 8 00:41:13.672463 systemd-resolved[1149]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 8 00:41:13.681392 env[1196]: time="2025-05-08T00:41:13.681155007Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-pm8mh,Uid:2800af31-37f6-43fa-b72f-454be6588432,Namespace:calico-system,Attempt:1,} returns sandbox id \"b09d620f71eddb24ddbd19f438c29fc9454a101cd4fc1aae55ed60b8e0df1583\"" May 8 00:41:13.683208 env[1196]: time="2025-05-08T00:41:13.683174433Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 8 00:41:13.789000 audit[2331]: AVC avc: denied { write } for pid=2331 comm="tee" name="fd" dev="proc" ino=19334 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:41:13.789000 audit[2331]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff77f4aa2b a2=241 a3=1b6 items=1 ppid=2285 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:13.789000 audit: CWD cwd="/etc/service/enabled/bird/log" May 8 00:41:13.789000 audit: PATH item=0 name="/dev/fd/63" inode=19979 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:41:13.789000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:41:13.798000 audit[2344]: AVC avc: denied { write } for pid=2344 comm="tee" name="fd" dev="proc" ino=19338 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:41:13.802000 audit[2336]: AVC avc: denied { write } for pid=2336 comm="tee" name="fd" dev="proc" ino=19341 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:41:13.798000 audit[2344]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc6adc1a1a a2=241 a3=1b6 items=1 ppid=2286 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:13.798000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 8 00:41:13.798000 audit: PATH item=0 name="/dev/fd/63" inode=19331 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:41:13.798000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:41:13.802000 audit[2336]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeeb85da2a a2=241 a3=1b6 items=1 ppid=2293 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:13.802000 audit: CWD cwd="/etc/service/enabled/confd/log" May 8 00:41:13.802000 audit: PATH item=0 name="/dev/fd/63" inode=21526 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:41:13.802000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:41:13.809000 audit[2353]: AVC avc: denied { write } for pid=2353 comm="tee" name="fd" dev="proc" ino=19349 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:41:13.811000 audit[2348]: AVC avc: denied { write } for pid=2348 comm="tee" name="fd" dev="proc" ino=21133 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:41:13.811000 audit[2348]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc36e69a2a a2=241 a3=1b6 items=1 ppid=2294 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:13.811000 audit: CWD cwd="/etc/service/enabled/felix/log" May 8 00:41:13.811000 audit: PATH item=0 name="/dev/fd/63" inode=21130 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:41:13.811000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:41:13.809000 audit[2353]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc2a303a2c a2=241 a3=1b6 items=1 ppid=2298 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:13.809000 audit: CWD cwd="/etc/service/enabled/cni/log" May 8 00:41:13.809000 audit: PATH item=0 name="/dev/fd/63" inode=19344 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:41:13.809000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:41:13.814000 audit[2351]: AVC avc: denied { write } for pid=2351 comm="tee" name="fd" dev="proc" ino=19986 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:41:13.814000 audit[2351]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd3925aa2a a2=241 a3=1b6 items=1 ppid=2287 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:13.814000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 8 00:41:13.814000 audit: PATH item=0 name="/dev/fd/63" inode=19983 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:41:13.814000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:41:13.820000 audit[2363]: AVC avc: denied { write } for pid=2363 comm="tee" name="fd" dev="proc" ino=19354 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 8 00:41:13.820000 audit[2363]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc4198ba1b a2=241 a3=1b6 items=1 ppid=2297 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:13.820000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 8 00:41:13.820000 audit: PATH item=0 name="/dev/fd/63" inode=21136 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:41:13.821809 kubelet[1450]: E0508 00:41:13.821725 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:13.820000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 8 00:41:13.914000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.914000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.914000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.914000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.914000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.914000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.914000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.914000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.914000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.914000 audit: BPF prog-id=85 op=LOAD May 8 00:41:13.914000 audit[2405]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd7060dd90 a2=98 a3=3 items=0 ppid=2295 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:13.914000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:41:13.915000 audit: BPF prog-id=85 op=UNLOAD May 8 00:41:13.915000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.915000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.915000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.915000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.915000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.915000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.915000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.915000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.915000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.915000 audit: BPF prog-id=86 op=LOAD May 8 00:41:13.915000 audit[2405]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd7060db70 a2=74 a3=540051 items=0 ppid=2295 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:13.915000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:41:13.915000 audit: BPF prog-id=86 op=UNLOAD May 8 00:41:13.915000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.915000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.915000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.915000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.915000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.915000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.915000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.915000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.915000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:13.915000 audit: BPF prog-id=87 op=LOAD May 8 00:41:13.915000 audit[2405]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd7060dba0 a2=94 a3=2 items=0 ppid=2295 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:13.915000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:41:13.915000 audit: BPF prog-id=87 op=UNLOAD May 8 00:41:14.027000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.027000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.027000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.027000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.027000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.027000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.027000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.027000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.027000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.027000 audit: BPF prog-id=88 op=LOAD May 8 00:41:14.027000 audit[2405]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd7060da60 a2=40 a3=1 items=0 ppid=2295 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.027000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:41:14.027000 audit: BPF prog-id=88 op=UNLOAD May 8 00:41:14.027000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.027000 audit[2405]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd7060db30 a2=50 a3=7ffd7060dc10 items=0 ppid=2295 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.027000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:41:14.035000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.035000 audit[2405]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd7060da70 a2=28 a3=0 items=0 ppid=2295 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.035000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:41:14.036000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.036000 audit[2405]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd7060daa0 a2=28 a3=0 items=0 ppid=2295 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.036000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:41:14.036000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.036000 audit[2405]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd7060d9b0 a2=28 a3=0 items=0 ppid=2295 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.036000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:41:14.036000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.036000 audit[2405]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd7060dac0 a2=28 a3=0 items=0 ppid=2295 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.036000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:41:14.036000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.036000 audit[2405]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd7060daa0 a2=28 a3=0 items=0 ppid=2295 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.036000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:41:14.036000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.036000 audit[2405]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd7060da90 a2=28 a3=0 items=0 ppid=2295 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.036000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:41:14.036000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.036000 audit[2405]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd7060dac0 a2=28 a3=0 items=0 ppid=2295 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.036000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:41:14.036000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.036000 audit[2405]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd7060daa0 a2=28 a3=0 items=0 ppid=2295 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.036000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:41:14.036000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.036000 audit[2405]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd7060dac0 a2=28 a3=0 items=0 ppid=2295 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.036000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:41:14.036000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.036000 audit[2405]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd7060da90 a2=28 a3=0 items=0 ppid=2295 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.036000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:41:14.036000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.036000 audit[2405]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd7060db00 a2=28 a3=0 items=0 ppid=2295 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.036000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:41:14.036000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.036000 audit[2405]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd7060d8b0 a2=50 a3=1 items=0 ppid=2295 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.036000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:41:14.036000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.036000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.036000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.036000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.036000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.036000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.036000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.036000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.036000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.036000 audit: BPF prog-id=89 op=LOAD May 8 00:41:14.036000 audit[2405]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd7060d8b0 a2=94 a3=5 items=0 ppid=2295 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.036000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:41:14.036000 audit: BPF prog-id=89 op=UNLOAD May 8 00:41:14.036000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.036000 audit[2405]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd7060d960 a2=50 a3=1 items=0 ppid=2295 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.036000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:41:14.036000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.036000 audit[2405]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd7060da80 a2=4 a3=38 items=0 ppid=2295 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.036000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:41:14.036000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.036000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.036000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.036000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.036000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.036000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.036000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.036000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.036000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.036000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.036000 audit[2405]: AVC avc: denied { confidentiality } for pid=2405 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:14.036000 audit[2405]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd7060dad0 a2=94 a3=6 items=0 ppid=2295 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.036000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:41:14.036000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.036000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.036000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.036000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.036000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.036000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.036000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.036000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.036000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.036000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.036000 audit[2405]: AVC avc: denied { confidentiality } for pid=2405 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:14.036000 audit[2405]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd7060d280 a2=94 a3=83 items=0 ppid=2295 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.036000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:41:14.036000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.036000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.036000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.036000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.036000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.036000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.036000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.036000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.036000 audit[2405]: AVC avc: denied { perfmon } for pid=2405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.036000 audit[2405]: AVC avc: denied { bpf } for pid=2405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.036000 audit[2405]: AVC avc: denied { confidentiality } for pid=2405 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:14.036000 audit[2405]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd7060d280 a2=94 a3=83 items=0 ppid=2295 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.036000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 8 00:41:14.044000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.044000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.044000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.044000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.044000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.044000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.044000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.044000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.044000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.044000 audit: BPF prog-id=90 op=LOAD May 8 00:41:14.044000 audit[2408]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffce1db8980 a2=98 a3=1999999999999999 items=0 ppid=2295 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.044000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 8 00:41:14.044000 audit: BPF prog-id=90 op=UNLOAD May 8 00:41:14.044000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.044000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.044000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.044000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.044000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.044000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.044000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.044000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.044000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.044000 audit: BPF prog-id=91 op=LOAD May 8 00:41:14.044000 audit[2408]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffce1db8860 a2=74 a3=ffff items=0 ppid=2295 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.044000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 8 00:41:14.045000 audit: BPF prog-id=91 op=UNLOAD May 8 00:41:14.045000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.045000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.045000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.045000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.045000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.045000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.045000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.045000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.045000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.045000 audit: BPF prog-id=92 op=LOAD May 8 00:41:14.045000 audit[2408]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffce1db88a0 a2=40 a3=7ffce1db8a80 items=0 ppid=2295 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.045000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 8 00:41:14.045000 audit: BPF prog-id=92 op=UNLOAD May 8 00:41:14.098121 systemd-networkd[1022]: vxlan.calico: Link UP May 8 00:41:14.098135 systemd-networkd[1022]: vxlan.calico: Gained carrier May 8 00:41:14.111000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.111000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.111000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.111000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.111000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.111000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.111000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.111000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.111000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.111000 audit: BPF prog-id=93 op=LOAD May 8 00:41:14.111000 audit[2435]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcf3354710 a2=98 a3=ffffffff items=0 ppid=2295 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.111000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:41:14.112000 audit: BPF prog-id=93 op=UNLOAD May 8 00:41:14.112000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.112000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.112000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.112000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.112000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.112000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.112000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.112000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.112000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.112000 audit: BPF prog-id=94 op=LOAD May 8 00:41:14.112000 audit[2435]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcf3354520 a2=74 a3=540051 items=0 ppid=2295 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.112000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:41:14.112000 audit: BPF prog-id=94 op=UNLOAD May 8 00:41:14.112000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.112000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.112000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.112000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.112000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.112000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.112000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.112000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.112000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.112000 audit: BPF prog-id=95 op=LOAD May 8 00:41:14.112000 audit[2435]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcf3354550 a2=94 a3=2 items=0 ppid=2295 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.112000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:41:14.112000 audit: BPF prog-id=95 op=UNLOAD May 8 00:41:14.112000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.112000 audit[2435]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcf3354420 a2=28 a3=0 items=0 ppid=2295 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.112000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:41:14.112000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.112000 audit[2435]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcf3354450 a2=28 a3=0 items=0 ppid=2295 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.112000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:41:14.112000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.112000 audit[2435]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcf3354360 a2=28 a3=0 items=0 ppid=2295 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.112000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:41:14.112000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.112000 audit[2435]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcf3354470 a2=28 a3=0 items=0 ppid=2295 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.112000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:41:14.112000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.112000 audit[2435]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcf3354450 a2=28 a3=0 items=0 ppid=2295 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.112000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:41:14.112000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.112000 audit[2435]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcf3354440 a2=28 a3=0 items=0 ppid=2295 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.112000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:41:14.112000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.112000 audit[2435]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcf3354470 a2=28 a3=0 items=0 ppid=2295 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.112000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:41:14.112000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.112000 audit[2435]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcf3354450 a2=28 a3=0 items=0 ppid=2295 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.112000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:41:14.112000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.112000 audit[2435]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcf3354470 a2=28 a3=0 items=0 ppid=2295 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.112000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:41:14.112000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.112000 audit[2435]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcf3354440 a2=28 a3=0 items=0 ppid=2295 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.112000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:41:14.112000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.112000 audit[2435]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcf33544b0 a2=28 a3=0 items=0 ppid=2295 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.112000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:41:14.112000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.112000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.112000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.112000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.112000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.112000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.112000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.112000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.112000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.112000 audit: BPF prog-id=96 op=LOAD May 8 00:41:14.112000 audit[2435]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcf3354320 a2=40 a3=0 items=0 ppid=2295 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.112000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:41:14.112000 audit: BPF prog-id=96 op=UNLOAD May 8 00:41:14.113000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.113000 audit[2435]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffcf3354310 a2=50 a3=2800 items=0 ppid=2295 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.113000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:41:14.113000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.113000 audit[2435]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffcf3354310 a2=50 a3=2800 items=0 ppid=2295 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.113000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:41:14.113000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.113000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.113000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.113000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.113000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.113000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.113000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.113000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.113000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.113000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.113000 audit: BPF prog-id=97 op=LOAD May 8 00:41:14.113000 audit[2435]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcf3353b30 a2=94 a3=2 items=0 ppid=2295 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.113000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:41:14.113000 audit: BPF prog-id=97 op=UNLOAD May 8 00:41:14.113000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.113000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.113000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.113000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.113000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.113000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.113000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.113000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.113000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.113000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.113000 audit: BPF prog-id=98 op=LOAD May 8 00:41:14.113000 audit[2435]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcf3353c30 a2=94 a3=30 items=0 ppid=2295 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.113000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 8 00:41:14.117000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.117000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.117000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.117000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.117000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.117000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.117000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.117000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.117000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.117000 audit: BPF prog-id=99 op=LOAD May 8 00:41:14.117000 audit[2437]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe7d8036d0 a2=98 a3=0 items=0 ppid=2295 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.117000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:41:14.117000 audit: BPF prog-id=99 op=UNLOAD May 8 00:41:14.117000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.117000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.117000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.117000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.117000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.117000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.117000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.117000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.117000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.117000 audit: BPF prog-id=100 op=LOAD May 8 00:41:14.117000 audit[2437]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe7d8034b0 a2=74 a3=540051 items=0 ppid=2295 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.117000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:41:14.118000 audit: BPF prog-id=100 op=UNLOAD May 8 00:41:14.118000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.118000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.118000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.118000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.118000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.118000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.118000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.118000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.118000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.118000 audit: BPF prog-id=101 op=LOAD May 8 00:41:14.118000 audit[2437]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe7d8034e0 a2=94 a3=2 items=0 ppid=2295 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.118000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:41:14.118000 audit: BPF prog-id=101 op=UNLOAD May 8 00:41:14.195734 kubelet[1450]: E0508 00:41:14.194863 1450 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:41:14.270000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.270000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.270000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.270000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.270000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.270000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.270000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.270000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.270000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.270000 audit: BPF prog-id=102 op=LOAD May 8 00:41:14.270000 audit[2437]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe7d8033a0 a2=40 a3=1 items=0 ppid=2295 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.270000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:41:14.270000 audit: BPF prog-id=102 op=UNLOAD May 8 00:41:14.270000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.270000 audit[2437]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe7d803470 a2=50 a3=7ffe7d803550 items=0 ppid=2295 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.270000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:41:14.278000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.278000 audit[2437]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe7d8033b0 a2=28 a3=0 items=0 ppid=2295 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.278000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:41:14.278000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.278000 audit[2437]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe7d8033e0 a2=28 a3=0 items=0 ppid=2295 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.278000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:41:14.278000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.278000 audit[2437]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe7d8032f0 a2=28 a3=0 items=0 ppid=2295 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.278000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:41:14.278000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.278000 audit[2437]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe7d803400 a2=28 a3=0 items=0 ppid=2295 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.278000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:41:14.278000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.278000 audit[2437]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe7d8033e0 a2=28 a3=0 items=0 ppid=2295 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.278000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:41:14.278000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.278000 audit[2437]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe7d8033d0 a2=28 a3=0 items=0 ppid=2295 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.278000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:41:14.278000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.278000 audit[2437]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe7d803400 a2=28 a3=0 items=0 ppid=2295 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.278000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:41:14.278000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.278000 audit[2437]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe7d8033e0 a2=28 a3=0 items=0 ppid=2295 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.278000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:41:14.278000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.278000 audit[2437]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe7d803400 a2=28 a3=0 items=0 ppid=2295 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.278000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:41:14.278000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.278000 audit[2437]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe7d8033d0 a2=28 a3=0 items=0 ppid=2295 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.278000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:41:14.278000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.278000 audit[2437]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe7d803440 a2=28 a3=0 items=0 ppid=2295 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.278000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:41:14.279000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.279000 audit[2437]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe7d8031f0 a2=50 a3=1 items=0 ppid=2295 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.279000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:41:14.279000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.279000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.279000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.279000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.279000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.279000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.279000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.279000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.279000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.279000 audit: BPF prog-id=103 op=LOAD May 8 00:41:14.279000 audit[2437]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe7d8031f0 a2=94 a3=5 items=0 ppid=2295 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.279000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:41:14.279000 audit: BPF prog-id=103 op=UNLOAD May 8 00:41:14.279000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.279000 audit[2437]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe7d8032a0 a2=50 a3=1 items=0 ppid=2295 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.279000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:41:14.279000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.279000 audit[2437]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe7d8033c0 a2=4 a3=38 items=0 ppid=2295 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.279000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:41:14.279000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.279000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.279000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.279000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.279000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.279000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.279000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.279000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.279000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.279000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.279000 audit[2437]: AVC avc: denied { confidentiality } for pid=2437 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:14.279000 audit[2437]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe7d803410 a2=94 a3=6 items=0 ppid=2295 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.279000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:41:14.279000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.279000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.279000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.279000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.279000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.279000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.279000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.279000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.279000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.279000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.279000 audit[2437]: AVC avc: denied { confidentiality } for pid=2437 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:14.279000 audit[2437]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe7d802bc0 a2=94 a3=83 items=0 ppid=2295 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.279000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:41:14.279000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.279000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.279000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.279000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.279000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.279000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.279000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.279000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.279000 audit[2437]: AVC avc: denied { perfmon } for pid=2437 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.279000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.279000 audit[2437]: AVC avc: denied { confidentiality } for pid=2437 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:14.279000 audit[2437]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe7d802bc0 a2=94 a3=83 items=0 ppid=2295 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.279000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:41:14.280000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.280000 audit[2437]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe7d804600 a2=10 a3=208 items=0 ppid=2295 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.280000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:41:14.280000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.280000 audit[2437]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe7d8044a0 a2=10 a3=3 items=0 ppid=2295 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.280000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:41:14.280000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.280000 audit[2437]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe7d804440 a2=10 a3=3 items=0 ppid=2295 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.280000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:41:14.280000 audit[2437]: AVC avc: denied { bpf } for pid=2437 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:14.280000 audit[2437]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe7d804440 a2=10 a3=7 items=0 ppid=2295 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.280000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 8 00:41:14.287000 audit: BPF prog-id=98 op=UNLOAD May 8 00:41:14.345000 audit[2489]: NETFILTER_CFG table=mangle:77 family=2 entries=16 op=nft_register_chain pid=2489 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:41:14.345000 audit[2489]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7fff3805d940 a2=0 a3=7fff3805d92c items=0 ppid=2295 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.345000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:41:14.351000 audit[2487]: NETFILTER_CFG table=nat:78 family=2 entries=15 op=nft_register_chain pid=2487 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:41:14.351000 audit[2487]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffedc7bd190 a2=0 a3=7ffedc7bd17c items=0 ppid=2295 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.351000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:41:14.356000 audit[2492]: NETFILTER_CFG table=filter:79 family=2 entries=69 op=nft_register_chain pid=2492 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:41:14.356000 audit[2492]: SYSCALL arch=c000003e syscall=46 success=yes exit=36404 a0=3 a1=7fff67b4d780 a2=0 a3=7fff67b4d76c items=0 ppid=2295 pid=2492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.356000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:41:14.362000 audit[2488]: NETFILTER_CFG table=raw:80 family=2 entries=21 op=nft_register_chain pid=2488 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:41:14.362000 audit[2488]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffd9a006a60 a2=0 a3=7ffd9a006a4c items=0 ppid=2295 pid=2488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:14.362000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:41:14.822130 kubelet[1450]: E0508 00:41:14.822073 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:15.322203 systemd-networkd[1022]: cali1616c835726: Gained IPv6LL May 8 00:41:15.797772 kubelet[1450]: E0508 00:41:15.797712 1450 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:15.822346 kubelet[1450]: E0508 00:41:15.822300 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:16.090275 systemd-networkd[1022]: vxlan.calico: Gained IPv6LL May 8 00:41:16.443407 env[1196]: time="2025-05-08T00:41:16.443207546Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:41:16.445242 env[1196]: time="2025-05-08T00:41:16.445210997Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:41:16.449233 env[1196]: time="2025-05-08T00:41:16.449172643Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:41:16.451187 env[1196]: time="2025-05-08T00:41:16.451141277Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:41:16.451779 env[1196]: time="2025-05-08T00:41:16.451738865Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505\"" May 8 00:41:16.457254 env[1196]: time="2025-05-08T00:41:16.457197297Z" level=info msg="CreateContainer within sandbox \"b09d620f71eddb24ddbd19f438c29fc9454a101cd4fc1aae55ed60b8e0df1583\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 8 00:41:16.482090 env[1196]: time="2025-05-08T00:41:16.482031181Z" level=info msg="CreateContainer within sandbox \"b09d620f71eddb24ddbd19f438c29fc9454a101cd4fc1aae55ed60b8e0df1583\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"ae8c358be5988f6945bb0b8ad4be73dc8084f38a5b321876336178cfb7f05fd7\"" May 8 00:41:16.482632 env[1196]: time="2025-05-08T00:41:16.482596077Z" level=info msg="StartContainer for \"ae8c358be5988f6945bb0b8ad4be73dc8084f38a5b321876336178cfb7f05fd7\"" May 8 00:41:16.502727 systemd[1]: Started cri-containerd-ae8c358be5988f6945bb0b8ad4be73dc8084f38a5b321876336178cfb7f05fd7.scope. May 8 00:41:16.518000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:16.518000 audit[2507]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f52aa41aa18 items=0 ppid=2242 pid=2507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:16.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165386333353862653539383866363934356262306238616434626537 May 8 00:41:16.518000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:16.518000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:16.518000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:16.518000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:16.518000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:16.518000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:16.518000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:16.518000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:16.518000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:16.518000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:16.518000 audit: BPF prog-id=104 op=LOAD May 8 00:41:16.518000 audit[2507]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c000178938 items=0 ppid=2242 pid=2507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:16.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165386333353862653539383866363934356262306238616434626537 May 8 00:41:16.518000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:16.518000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:16.518000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:16.518000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:16.518000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:16.518000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:16.518000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:16.518000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:16.518000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:16.518000 audit: BPF prog-id=105 op=LOAD May 8 00:41:16.518000 audit[2507]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c000178988 items=0 ppid=2242 pid=2507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:16.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165386333353862653539383866363934356262306238616434626537 May 8 00:41:16.519000 audit: BPF prog-id=105 op=UNLOAD May 8 00:41:16.519000 audit: BPF prog-id=104 op=UNLOAD May 8 00:41:16.519000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:16.519000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:16.519000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:16.519000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:16.519000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:16.519000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:16.519000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:16.519000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:16.519000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:16.519000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:16.519000 audit: BPF prog-id=106 op=LOAD May 8 00:41:16.519000 audit[2507]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c000178a18 items=0 ppid=2242 pid=2507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:16.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165386333353862653539383866363934356262306238616434626537 May 8 00:41:16.535377 env[1196]: time="2025-05-08T00:41:16.535301489Z" level=info msg="StartContainer for \"ae8c358be5988f6945bb0b8ad4be73dc8084f38a5b321876336178cfb7f05fd7\" returns successfully" May 8 00:41:16.536838 env[1196]: time="2025-05-08T00:41:16.536769750Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 8 00:41:16.822774 kubelet[1450]: E0508 00:41:16.822711 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:17.823307 kubelet[1450]: E0508 00:41:17.823238 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:18.177000 audit[2536]: NETFILTER_CFG table=filter:81 family=2 entries=9 op=nft_register_rule pid=2536 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:41:18.179854 kernel: kauditd_printk_skb: 648 callbacks suppressed May 8 00:41:18.179928 kernel: audit: type=1325 audit(1746664878.177:683): table=filter:81 family=2 entries=9 op=nft_register_rule pid=2536 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:41:18.177000 audit[2536]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffefc5e7e10 a2=0 a3=7ffefc5e7dfc items=0 ppid=1707 pid=2536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:18.188017 kernel: audit: type=1300 audit(1746664878.177:683): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffefc5e7e10 a2=0 a3=7ffefc5e7dfc items=0 ppid=1707 pid=2536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:18.188078 kernel: audit: type=1327 audit(1746664878.177:683): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:41:18.177000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:41:18.191000 audit[2536]: NETFILTER_CFG table=nat:82 family=2 entries=27 op=nft_register_chain pid=2536 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:41:18.191000 audit[2536]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffefc5e7e10 a2=0 a3=7ffefc5e7dfc items=0 ppid=1707 pid=2536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:18.200888 kernel: audit: type=1325 audit(1746664878.191:684): table=nat:82 family=2 entries=27 op=nft_register_chain pid=2536 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:41:18.200938 kernel: audit: type=1300 audit(1746664878.191:684): arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffefc5e7e10 a2=0 a3=7ffefc5e7dfc items=0 ppid=1707 pid=2536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:18.200980 kernel: audit: type=1327 audit(1746664878.191:684): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:41:18.191000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:41:18.824199 kubelet[1450]: E0508 00:41:18.824124 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:19.825352 kubelet[1450]: E0508 00:41:19.825275 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:19.855560 env[1196]: time="2025-05-08T00:41:19.855481604Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:41:19.858056 env[1196]: time="2025-05-08T00:41:19.858008476Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:41:19.860270 env[1196]: time="2025-05-08T00:41:19.860224234Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:41:19.862297 env[1196]: time="2025-05-08T00:41:19.862241937Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:41:19.862812 env[1196]: time="2025-05-08T00:41:19.862781063Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9\"" May 8 00:41:19.865258 env[1196]: time="2025-05-08T00:41:19.865223418Z" level=info msg="CreateContainer within sandbox \"b09d620f71eddb24ddbd19f438c29fc9454a101cd4fc1aae55ed60b8e0df1583\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 8 00:41:19.904213 env[1196]: time="2025-05-08T00:41:19.904107299Z" level=info msg="CreateContainer within sandbox \"b09d620f71eddb24ddbd19f438c29fc9454a101cd4fc1aae55ed60b8e0df1583\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"0e4e280ae96cc223a3e9b2aa4809129addb819392f3106736ee0352aaacbba39\"" May 8 00:41:19.905017 env[1196]: time="2025-05-08T00:41:19.904956991Z" level=info msg="StartContainer for \"0e4e280ae96cc223a3e9b2aa4809129addb819392f3106736ee0352aaacbba39\"" May 8 00:41:19.927876 systemd[1]: Started cri-containerd-0e4e280ae96cc223a3e9b2aa4809129addb819392f3106736ee0352aaacbba39.scope. May 8 00:41:19.945000 audit[2553]: AVC avc: denied { perfmon } for pid=2553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:19.945000 audit[2553]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f14fc237230 items=0 ppid=2242 pid=2553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:19.965726 kernel: audit: type=1400 audit(1746664879.945:685): avc: denied { perfmon } for pid=2553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:19.965954 kernel: audit: type=1300 audit(1746664879.945:685): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f14fc237230 items=0 ppid=2242 pid=2553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:19.966002 kernel: audit: type=1327 audit(1746664879.945:685): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065346532383061653936636332323361336539623261613438303931 May 8 00:41:19.945000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065346532383061653936636332323361336539623261613438303931 May 8 00:41:19.969787 kernel: audit: type=1400 audit(1746664879.945:686): avc: denied { bpf } for pid=2553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:19.945000 audit[2553]: AVC avc: denied { bpf } for pid=2553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:19.945000 audit[2553]: AVC avc: denied { bpf } for pid=2553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:19.945000 audit[2553]: AVC avc: denied { bpf } for pid=2553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:19.945000 audit[2553]: AVC avc: denied { perfmon } for pid=2553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:19.945000 audit[2553]: AVC avc: denied { perfmon } for pid=2553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:19.945000 audit[2553]: AVC avc: denied { perfmon } for pid=2553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:19.945000 audit[2553]: AVC avc: denied { perfmon } for pid=2553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:19.945000 audit[2553]: AVC avc: denied { perfmon } for pid=2553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:19.945000 audit[2553]: AVC avc: denied { bpf } for pid=2553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:19.945000 audit[2553]: AVC avc: denied { bpf } for pid=2553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:19.945000 audit: BPF prog-id=107 op=LOAD May 8 00:41:19.945000 audit[2553]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00033ae18 items=0 ppid=2242 pid=2553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:19.945000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065346532383061653936636332323361336539623261613438303931 May 8 00:41:19.969000 audit[2553]: AVC avc: denied { bpf } for pid=2553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:19.969000 audit[2553]: AVC avc: denied { bpf } for pid=2553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:19.969000 audit[2553]: AVC avc: denied { perfmon } for pid=2553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:19.969000 audit[2553]: AVC avc: denied { perfmon } for pid=2553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:19.969000 audit[2553]: AVC avc: denied { perfmon } for pid=2553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:19.969000 audit[2553]: AVC avc: denied { perfmon } for pid=2553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:19.969000 audit[2553]: AVC avc: denied { perfmon } for pid=2553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:19.969000 audit[2553]: AVC avc: denied { bpf } for pid=2553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:19.969000 audit[2553]: AVC avc: denied { bpf } for pid=2553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:19.969000 audit: BPF prog-id=108 op=LOAD May 8 00:41:19.969000 audit[2553]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00033ae68 items=0 ppid=2242 pid=2553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:19.969000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065346532383061653936636332323361336539623261613438303931 May 8 00:41:19.972000 audit: BPF prog-id=108 op=UNLOAD May 8 00:41:19.972000 audit: BPF prog-id=107 op=UNLOAD May 8 00:41:19.972000 audit[2553]: AVC avc: denied { bpf } for pid=2553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:19.972000 audit[2553]: AVC avc: denied { bpf } for pid=2553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:19.972000 audit[2553]: AVC avc: denied { bpf } for pid=2553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:19.972000 audit[2553]: AVC avc: denied { perfmon } for pid=2553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:19.972000 audit[2553]: AVC avc: denied { perfmon } for pid=2553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:19.972000 audit[2553]: AVC avc: denied { perfmon } for pid=2553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:19.972000 audit[2553]: AVC avc: denied { perfmon } for pid=2553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:19.972000 audit[2553]: AVC avc: denied { perfmon } for pid=2553 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:19.972000 audit[2553]: AVC avc: denied { bpf } for pid=2553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:19.972000 audit[2553]: AVC avc: denied { bpf } for pid=2553 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:19.972000 audit: BPF prog-id=109 op=LOAD May 8 00:41:19.972000 audit[2553]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00033aef8 items=0 ppid=2242 pid=2553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:19.972000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065346532383061653936636332323361336539623261613438303931 May 8 00:41:20.005574 kubelet[1450]: I0508 00:41:20.005529 1450 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 8 00:41:20.005574 kubelet[1450]: I0508 00:41:20.005571 1450 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 8 00:41:20.037129 env[1196]: time="2025-05-08T00:41:20.037070660Z" level=info msg="StopPodSandbox for \"91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e\"" May 8 00:41:20.181611 env[1196]: time="2025-05-08T00:41:20.180796928Z" level=info msg="StartContainer for \"0e4e280ae96cc223a3e9b2aa4809129addb819392f3106736ee0352aaacbba39\" returns successfully" May 8 00:41:20.427102 kubelet[1450]: I0508 00:41:20.427003 1450 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-pm8mh" podStartSLOduration=38.245748662 podStartE2EDuration="44.4269436s" podCreationTimestamp="2025-05-08 00:40:36 +0000 UTC" firstStartedPulling="2025-05-08 00:41:13.682511079 +0000 UTC m=+39.512451616" lastFinishedPulling="2025-05-08 00:41:19.863706027 +0000 UTC m=+45.693646554" observedRunningTime="2025-05-08 00:41:20.426809517 +0000 UTC m=+46.256750044" watchObservedRunningTime="2025-05-08 00:41:20.4269436 +0000 UTC m=+46.256884137" May 8 00:41:20.432762 env[1196]: 2025-05-08 00:41:20.314 [INFO][2599] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e" May 8 00:41:20.432762 env[1196]: 2025-05-08 00:41:20.315 [INFO][2599] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e" iface="eth0" netns="/var/run/netns/cni-a7716222-b3e2-1aee-0154-1d91c735ab4e" May 8 00:41:20.432762 env[1196]: 2025-05-08 00:41:20.315 [INFO][2599] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e" iface="eth0" netns="/var/run/netns/cni-a7716222-b3e2-1aee-0154-1d91c735ab4e" May 8 00:41:20.432762 env[1196]: 2025-05-08 00:41:20.315 [INFO][2599] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e" iface="eth0" netns="/var/run/netns/cni-a7716222-b3e2-1aee-0154-1d91c735ab4e" May 8 00:41:20.432762 env[1196]: 2025-05-08 00:41:20.315 [INFO][2599] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e" May 8 00:41:20.432762 env[1196]: 2025-05-08 00:41:20.315 [INFO][2599] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e" May 8 00:41:20.432762 env[1196]: 2025-05-08 00:41:20.335 [INFO][2607] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e" HandleID="k8s-pod-network.91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e" Workload="10.0.0.33-k8s-nginx--deployment--7fcdb87857--jhz2q-eth0" May 8 00:41:20.432762 env[1196]: 2025-05-08 00:41:20.335 [INFO][2607] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:41:20.432762 env[1196]: 2025-05-08 00:41:20.335 [INFO][2607] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:41:20.432762 env[1196]: 2025-05-08 00:41:20.426 [WARNING][2607] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e" HandleID="k8s-pod-network.91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e" Workload="10.0.0.33-k8s-nginx--deployment--7fcdb87857--jhz2q-eth0" May 8 00:41:20.432762 env[1196]: 2025-05-08 00:41:20.426 [INFO][2607] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e" HandleID="k8s-pod-network.91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e" Workload="10.0.0.33-k8s-nginx--deployment--7fcdb87857--jhz2q-eth0" May 8 00:41:20.432762 env[1196]: 2025-05-08 00:41:20.429 [INFO][2607] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:41:20.432762 env[1196]: 2025-05-08 00:41:20.430 [INFO][2599] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e" May 8 00:41:20.432762 env[1196]: time="2025-05-08T00:41:20.432663209Z" level=info msg="TearDown network for sandbox \"91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e\" successfully" May 8 00:41:20.432762 env[1196]: time="2025-05-08T00:41:20.432712141Z" level=info msg="StopPodSandbox for \"91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e\" returns successfully" May 8 00:41:20.433657 env[1196]: time="2025-05-08T00:41:20.433612307Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-jhz2q,Uid:e6df658e-6f40-435e-a1c0-431211d0175d,Namespace:default,Attempt:1,}" May 8 00:41:20.655775 systemd-networkd[1022]: calicfeeea98b4c: Link UP May 8 00:41:20.658706 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 8 00:41:20.659126 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calicfeeea98b4c: link becomes ready May 8 00:41:20.658924 systemd-networkd[1022]: calicfeeea98b4c: Gained carrier May 8 00:41:20.771079 env[1196]: 2025-05-08 00:41:20.573 [INFO][2615] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.33-k8s-nginx--deployment--7fcdb87857--jhz2q-eth0 nginx-deployment-7fcdb87857- default e6df658e-6f40-435e-a1c0-431211d0175d 1176 0 2025-05-08 00:41:03 +0000 UTC map[app:nginx pod-template-hash:7fcdb87857 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.33 nginx-deployment-7fcdb87857-jhz2q eth0 default [] [] [kns.default ksa.default.default] calicfeeea98b4c [] []}} ContainerID="7f2fbd9d5d1aeb28477bc8be4f7165690ed9fc4ce0f13ed6a93bcb5a0535eba8" Namespace="default" Pod="nginx-deployment-7fcdb87857-jhz2q" WorkloadEndpoint="10.0.0.33-k8s-nginx--deployment--7fcdb87857--jhz2q-" May 8 00:41:20.771079 env[1196]: 2025-05-08 00:41:20.573 [INFO][2615] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="7f2fbd9d5d1aeb28477bc8be4f7165690ed9fc4ce0f13ed6a93bcb5a0535eba8" Namespace="default" Pod="nginx-deployment-7fcdb87857-jhz2q" WorkloadEndpoint="10.0.0.33-k8s-nginx--deployment--7fcdb87857--jhz2q-eth0" May 8 00:41:20.771079 env[1196]: 2025-05-08 00:41:20.602 [INFO][2629] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7f2fbd9d5d1aeb28477bc8be4f7165690ed9fc4ce0f13ed6a93bcb5a0535eba8" HandleID="k8s-pod-network.7f2fbd9d5d1aeb28477bc8be4f7165690ed9fc4ce0f13ed6a93bcb5a0535eba8" Workload="10.0.0.33-k8s-nginx--deployment--7fcdb87857--jhz2q-eth0" May 8 00:41:20.771079 env[1196]: 2025-05-08 00:41:20.612 [INFO][2629] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="7f2fbd9d5d1aeb28477bc8be4f7165690ed9fc4ce0f13ed6a93bcb5a0535eba8" HandleID="k8s-pod-network.7f2fbd9d5d1aeb28477bc8be4f7165690ed9fc4ce0f13ed6a93bcb5a0535eba8" Workload="10.0.0.33-k8s-nginx--deployment--7fcdb87857--jhz2q-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000314f50), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.33", "pod":"nginx-deployment-7fcdb87857-jhz2q", "timestamp":"2025-05-08 00:41:20.602108754 +0000 UTC"}, Hostname:"10.0.0.33", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 8 00:41:20.771079 env[1196]: 2025-05-08 00:41:20.613 [INFO][2629] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:41:20.771079 env[1196]: 2025-05-08 00:41:20.613 [INFO][2629] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:41:20.771079 env[1196]: 2025-05-08 00:41:20.613 [INFO][2629] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.33' May 8 00:41:20.771079 env[1196]: 2025-05-08 00:41:20.616 [INFO][2629] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.7f2fbd9d5d1aeb28477bc8be4f7165690ed9fc4ce0f13ed6a93bcb5a0535eba8" host="10.0.0.33" May 8 00:41:20.771079 env[1196]: 2025-05-08 00:41:20.622 [INFO][2629] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.33" May 8 00:41:20.771079 env[1196]: 2025-05-08 00:41:20.627 [INFO][2629] ipam/ipam.go 489: Trying affinity for 192.168.91.128/26 host="10.0.0.33" May 8 00:41:20.771079 env[1196]: 2025-05-08 00:41:20.630 [INFO][2629] ipam/ipam.go 155: Attempting to load block cidr=192.168.91.128/26 host="10.0.0.33" May 8 00:41:20.771079 env[1196]: 2025-05-08 00:41:20.637 [INFO][2629] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.91.128/26 host="10.0.0.33" May 8 00:41:20.771079 env[1196]: 2025-05-08 00:41:20.637 [INFO][2629] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.91.128/26 handle="k8s-pod-network.7f2fbd9d5d1aeb28477bc8be4f7165690ed9fc4ce0f13ed6a93bcb5a0535eba8" host="10.0.0.33" May 8 00:41:20.771079 env[1196]: 2025-05-08 00:41:20.639 [INFO][2629] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.7f2fbd9d5d1aeb28477bc8be4f7165690ed9fc4ce0f13ed6a93bcb5a0535eba8 May 8 00:41:20.771079 env[1196]: 2025-05-08 00:41:20.644 [INFO][2629] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.91.128/26 handle="k8s-pod-network.7f2fbd9d5d1aeb28477bc8be4f7165690ed9fc4ce0f13ed6a93bcb5a0535eba8" host="10.0.0.33" May 8 00:41:20.771079 env[1196]: 2025-05-08 00:41:20.651 [INFO][2629] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.91.130/26] block=192.168.91.128/26 handle="k8s-pod-network.7f2fbd9d5d1aeb28477bc8be4f7165690ed9fc4ce0f13ed6a93bcb5a0535eba8" host="10.0.0.33" May 8 00:41:20.771079 env[1196]: 2025-05-08 00:41:20.651 [INFO][2629] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.91.130/26] handle="k8s-pod-network.7f2fbd9d5d1aeb28477bc8be4f7165690ed9fc4ce0f13ed6a93bcb5a0535eba8" host="10.0.0.33" May 8 00:41:20.771079 env[1196]: 2025-05-08 00:41:20.651 [INFO][2629] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:41:20.771079 env[1196]: 2025-05-08 00:41:20.651 [INFO][2629] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.91.130/26] IPv6=[] ContainerID="7f2fbd9d5d1aeb28477bc8be4f7165690ed9fc4ce0f13ed6a93bcb5a0535eba8" HandleID="k8s-pod-network.7f2fbd9d5d1aeb28477bc8be4f7165690ed9fc4ce0f13ed6a93bcb5a0535eba8" Workload="10.0.0.33-k8s-nginx--deployment--7fcdb87857--jhz2q-eth0" May 8 00:41:20.771865 env[1196]: 2025-05-08 00:41:20.653 [INFO][2615] cni-plugin/k8s.go 386: Populated endpoint ContainerID="7f2fbd9d5d1aeb28477bc8be4f7165690ed9fc4ce0f13ed6a93bcb5a0535eba8" Namespace="default" Pod="nginx-deployment-7fcdb87857-jhz2q" WorkloadEndpoint="10.0.0.33-k8s-nginx--deployment--7fcdb87857--jhz2q-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.33-k8s-nginx--deployment--7fcdb87857--jhz2q-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"e6df658e-6f40-435e-a1c0-431211d0175d", ResourceVersion:"1176", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 41, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.33", ContainerID:"", Pod:"nginx-deployment-7fcdb87857-jhz2q", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.91.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calicfeeea98b4c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:41:20.771865 env[1196]: 2025-05-08 00:41:20.653 [INFO][2615] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.91.130/32] ContainerID="7f2fbd9d5d1aeb28477bc8be4f7165690ed9fc4ce0f13ed6a93bcb5a0535eba8" Namespace="default" Pod="nginx-deployment-7fcdb87857-jhz2q" WorkloadEndpoint="10.0.0.33-k8s-nginx--deployment--7fcdb87857--jhz2q-eth0" May 8 00:41:20.771865 env[1196]: 2025-05-08 00:41:20.653 [INFO][2615] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calicfeeea98b4c ContainerID="7f2fbd9d5d1aeb28477bc8be4f7165690ed9fc4ce0f13ed6a93bcb5a0535eba8" Namespace="default" Pod="nginx-deployment-7fcdb87857-jhz2q" WorkloadEndpoint="10.0.0.33-k8s-nginx--deployment--7fcdb87857--jhz2q-eth0" May 8 00:41:20.771865 env[1196]: 2025-05-08 00:41:20.658 [INFO][2615] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="7f2fbd9d5d1aeb28477bc8be4f7165690ed9fc4ce0f13ed6a93bcb5a0535eba8" Namespace="default" Pod="nginx-deployment-7fcdb87857-jhz2q" WorkloadEndpoint="10.0.0.33-k8s-nginx--deployment--7fcdb87857--jhz2q-eth0" May 8 00:41:20.771865 env[1196]: 2025-05-08 00:41:20.659 [INFO][2615] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="7f2fbd9d5d1aeb28477bc8be4f7165690ed9fc4ce0f13ed6a93bcb5a0535eba8" Namespace="default" Pod="nginx-deployment-7fcdb87857-jhz2q" WorkloadEndpoint="10.0.0.33-k8s-nginx--deployment--7fcdb87857--jhz2q-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.33-k8s-nginx--deployment--7fcdb87857--jhz2q-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"e6df658e-6f40-435e-a1c0-431211d0175d", ResourceVersion:"1176", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 41, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.33", ContainerID:"7f2fbd9d5d1aeb28477bc8be4f7165690ed9fc4ce0f13ed6a93bcb5a0535eba8", Pod:"nginx-deployment-7fcdb87857-jhz2q", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.91.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calicfeeea98b4c", MAC:"4a:21:b8:44:ee:ca", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:41:20.771865 env[1196]: 2025-05-08 00:41:20.768 [INFO][2615] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="7f2fbd9d5d1aeb28477bc8be4f7165690ed9fc4ce0f13ed6a93bcb5a0535eba8" Namespace="default" Pod="nginx-deployment-7fcdb87857-jhz2q" WorkloadEndpoint="10.0.0.33-k8s-nginx--deployment--7fcdb87857--jhz2q-eth0" May 8 00:41:20.782000 audit[2653]: NETFILTER_CFG table=filter:83 family=2 entries=38 op=nft_register_chain pid=2653 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:41:20.782000 audit[2653]: SYSCALL arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7fff4d53f310 a2=0 a3=7fff4d53f2fc items=0 ppid=2295 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:20.782000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:41:20.787908 env[1196]: time="2025-05-08T00:41:20.787732570Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:41:20.787908 env[1196]: time="2025-05-08T00:41:20.787792713Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:41:20.787908 env[1196]: time="2025-05-08T00:41:20.787803704Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:41:20.788228 env[1196]: time="2025-05-08T00:41:20.788132644Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7f2fbd9d5d1aeb28477bc8be4f7165690ed9fc4ce0f13ed6a93bcb5a0535eba8 pid=2660 runtime=io.containerd.runc.v2 May 8 00:41:20.800590 systemd[1]: Started cri-containerd-7f2fbd9d5d1aeb28477bc8be4f7165690ed9fc4ce0f13ed6a93bcb5a0535eba8.scope. May 8 00:41:20.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:20.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:20.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:20.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:20.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:20.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:20.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:20.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:20.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:20.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:20.812000 audit: BPF prog-id=110 op=LOAD May 8 00:41:20.812000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:20.812000 audit[2670]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2660 pid=2670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:20.812000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766326662643964356431616562323834373762633862653466373136 May 8 00:41:20.812000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:20.812000 audit[2670]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2660 pid=2670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:20.812000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766326662643964356431616562323834373762633862653466373136 May 8 00:41:20.812000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:20.812000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:20.812000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:20.812000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:20.812000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:20.812000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:20.812000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:20.812000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:20.812000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:20.812000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:20.812000 audit: BPF prog-id=111 op=LOAD May 8 00:41:20.812000 audit[2670]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00032bd10 items=0 ppid=2660 pid=2670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:20.812000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766326662643964356431616562323834373762633862653466373136 May 8 00:41:20.812000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:20.812000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:20.812000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:20.812000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:20.812000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:20.812000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:20.812000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:20.812000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:20.812000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:20.812000 audit: BPF prog-id=112 op=LOAD May 8 00:41:20.812000 audit[2670]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00032bd58 items=0 ppid=2660 pid=2670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:20.812000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766326662643964356431616562323834373762633862653466373136 May 8 00:41:20.813000 audit: BPF prog-id=112 op=UNLOAD May 8 00:41:20.813000 audit: BPF prog-id=111 op=UNLOAD May 8 00:41:20.813000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:20.813000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:20.813000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:20.813000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:20.813000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:20.813000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:20.813000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:20.813000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:20.813000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:20.813000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:20.813000 audit: BPF prog-id=113 op=LOAD May 8 00:41:20.813000 audit[2670]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003b0168 items=0 ppid=2660 pid=2670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:20.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766326662643964356431616562323834373762633862653466373136 May 8 00:41:20.814737 systemd-resolved[1149]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 8 00:41:20.826147 kubelet[1450]: E0508 00:41:20.826058 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:20.839083 env[1196]: time="2025-05-08T00:41:20.838632082Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-jhz2q,Uid:e6df658e-6f40-435e-a1c0-431211d0175d,Namespace:default,Attempt:1,} returns sandbox id \"7f2fbd9d5d1aeb28477bc8be4f7165690ed9fc4ce0f13ed6a93bcb5a0535eba8\"" May 8 00:41:20.840861 env[1196]: time="2025-05-08T00:41:20.840795829Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 8 00:41:20.880533 systemd[1]: run-containerd-runc-k8s.io-0e4e280ae96cc223a3e9b2aa4809129addb819392f3106736ee0352aaacbba39-runc.fC3CxB.mount: Deactivated successfully. May 8 00:41:20.880660 systemd[1]: run-netns-cni\x2da7716222\x2db3e2\x2d1aee\x2d0154\x2d1d91c735ab4e.mount: Deactivated successfully. May 8 00:41:21.826781 kubelet[1450]: E0508 00:41:21.826717 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:22.554208 systemd-networkd[1022]: calicfeeea98b4c: Gained IPv6LL May 8 00:41:22.827319 kubelet[1450]: E0508 00:41:22.827169 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:23.828178 kubelet[1450]: E0508 00:41:23.828088 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:24.223095 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1802871770.mount: Deactivated successfully. May 8 00:41:24.828959 kubelet[1450]: E0508 00:41:24.828887 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:25.830045 kubelet[1450]: E0508 00:41:25.829861 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:26.830989 kubelet[1450]: E0508 00:41:26.830905 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:26.849658 env[1196]: time="2025-05-08T00:41:26.849582464Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:41:26.851795 env[1196]: time="2025-05-08T00:41:26.851757697Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:41:26.853540 env[1196]: time="2025-05-08T00:41:26.853510785Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:41:26.855858 env[1196]: time="2025-05-08T00:41:26.855811815Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:41:26.856827 env[1196]: time="2025-05-08T00:41:26.856788874Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa\"" May 8 00:41:26.859368 env[1196]: time="2025-05-08T00:41:26.859311550Z" level=info msg="CreateContainer within sandbox \"7f2fbd9d5d1aeb28477bc8be4f7165690ed9fc4ce0f13ed6a93bcb5a0535eba8\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" May 8 00:41:26.877482 env[1196]: time="2025-05-08T00:41:26.877394979Z" level=info msg="CreateContainer within sandbox \"7f2fbd9d5d1aeb28477bc8be4f7165690ed9fc4ce0f13ed6a93bcb5a0535eba8\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"9233fbd8419b6e0fb35d491cd9b69091ba29c2a79e0472f131387d634114e702\"" May 8 00:41:26.878168 env[1196]: time="2025-05-08T00:41:26.878131063Z" level=info msg="StartContainer for \"9233fbd8419b6e0fb35d491cd9b69091ba29c2a79e0472f131387d634114e702\"" May 8 00:41:26.893343 systemd[1]: Started cri-containerd-9233fbd8419b6e0fb35d491cd9b69091ba29c2a79e0472f131387d634114e702.scope. May 8 00:41:26.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:26.912244 kernel: kauditd_printk_skb: 99 callbacks suppressed May 8 00:41:26.912328 kernel: audit: type=1400 audit(1746664886.910:710): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:26.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:26.919450 kernel: audit: type=1400 audit(1746664886.910:711): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:26.919528 kernel: audit: type=1400 audit(1746664886.910:712): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:26.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:26.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:26.926029 kernel: audit: type=1400 audit(1746664886.910:713): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:26.926091 kernel: audit: type=1400 audit(1746664886.910:714): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:26.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:26.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:26.932901 kernel: audit: type=1400 audit(1746664886.910:715): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:26.933015 kernel: audit: type=1400 audit(1746664886.910:716): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:26.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:26.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:26.939550 kernel: audit: type=1400 audit(1746664886.910:717): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:26.939633 kernel: audit: type=1400 audit(1746664886.910:718): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:26.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:26.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:26.946807 kernel: audit: type=1400 audit(1746664886.914:719): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:26.914000 audit: BPF prog-id=114 op=LOAD May 8 00:41:26.914000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:26.914000 audit[2712]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2660 pid=2712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:26.914000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932333366626438343139623665306662333564343931636439623639 May 8 00:41:26.914000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:26.914000 audit[2712]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2660 pid=2712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:26.914000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932333366626438343139623665306662333564343931636439623639 May 8 00:41:26.914000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:26.914000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:26.914000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:26.914000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:26.914000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:26.914000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:26.914000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:26.914000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:26.914000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:26.914000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:26.914000 audit: BPF prog-id=115 op=LOAD May 8 00:41:26.914000 audit[2712]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00032ebf0 items=0 ppid=2660 pid=2712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:26.914000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932333366626438343139623665306662333564343931636439623639 May 8 00:41:26.918000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:26.918000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:26.918000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:26.918000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:26.918000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:26.918000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:26.918000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:26.918000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:26.918000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:26.918000 audit: BPF prog-id=116 op=LOAD May 8 00:41:26.918000 audit[2712]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00032ec38 items=0 ppid=2660 pid=2712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:26.918000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932333366626438343139623665306662333564343931636439623639 May 8 00:41:26.921000 audit: BPF prog-id=116 op=UNLOAD May 8 00:41:26.921000 audit: BPF prog-id=115 op=UNLOAD May 8 00:41:26.921000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:26.921000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:26.921000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:26.921000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:26.921000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:26.921000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:26.921000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:26.921000 audit[2712]: AVC avc: denied { perfmon } for pid=2712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:26.921000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:26.921000 audit[2712]: AVC avc: denied { bpf } for pid=2712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:26.921000 audit: BPF prog-id=117 op=LOAD May 8 00:41:26.921000 audit[2712]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00032f048 items=0 ppid=2660 pid=2712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:26.921000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932333366626438343139623665306662333564343931636439623639 May 8 00:41:26.959382 env[1196]: time="2025-05-08T00:41:26.959293938Z" level=info msg="StartContainer for \"9233fbd8419b6e0fb35d491cd9b69091ba29c2a79e0472f131387d634114e702\" returns successfully" May 8 00:41:27.310760 kubelet[1450]: I0508 00:41:27.310666 1450 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-7fcdb87857-jhz2q" podStartSLOduration=18.292586629 podStartE2EDuration="24.310643348s" podCreationTimestamp="2025-05-08 00:41:03 +0000 UTC" firstStartedPulling="2025-05-08 00:41:20.8399628 +0000 UTC m=+46.669903327" lastFinishedPulling="2025-05-08 00:41:26.858019519 +0000 UTC m=+52.687960046" observedRunningTime="2025-05-08 00:41:27.310393838 +0000 UTC m=+53.140334365" watchObservedRunningTime="2025-05-08 00:41:27.310643348 +0000 UTC m=+53.140583875" May 8 00:41:27.831846 kubelet[1450]: E0508 00:41:27.831785 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:28.832361 kubelet[1450]: E0508 00:41:28.832271 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:29.833532 kubelet[1450]: E0508 00:41:29.833456 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:30.834107 kubelet[1450]: E0508 00:41:30.834037 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:31.299000 audit[2764]: NETFILTER_CFG table=filter:84 family=2 entries=8 op=nft_register_rule pid=2764 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:41:31.299000 audit[2764]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fff358d7930 a2=0 a3=7fff358d791c items=0 ppid=1707 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:31.299000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:41:31.312000 audit[2764]: NETFILTER_CFG table=nat:85 family=2 entries=34 op=nft_register_chain pid=2764 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:41:31.312000 audit[2764]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7fff358d7930 a2=0 a3=7fff358d791c items=0 ppid=1707 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:31.312000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:41:31.835170 kubelet[1450]: E0508 00:41:31.835064 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:32.303000 audit[2766]: NETFILTER_CFG table=filter:86 family=2 entries=20 op=nft_register_rule pid=2766 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:41:32.305534 kernel: kauditd_printk_skb: 53 callbacks suppressed May 8 00:41:32.305614 kernel: audit: type=1325 audit(1746664892.303:730): table=filter:86 family=2 entries=20 op=nft_register_rule pid=2766 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:41:32.303000 audit[2766]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffe2e194280 a2=0 a3=7ffe2e19426c items=0 ppid=1707 pid=2766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:32.313125 kernel: audit: type=1300 audit(1746664892.303:730): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffe2e194280 a2=0 a3=7ffe2e19426c items=0 ppid=1707 pid=2766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:32.313198 kernel: audit: type=1327 audit(1746664892.303:730): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:41:32.303000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:41:32.316000 audit[2766]: NETFILTER_CFG table=nat:87 family=2 entries=22 op=nft_register_rule pid=2766 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:41:32.316000 audit[2766]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe2e194280 a2=0 a3=0 items=0 ppid=1707 pid=2766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:32.324943 kernel: audit: type=1325 audit(1746664892.316:731): table=nat:87 family=2 entries=22 op=nft_register_rule pid=2766 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:41:32.325004 kernel: audit: type=1300 audit(1746664892.316:731): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe2e194280 a2=0 a3=0 items=0 ppid=1707 pid=2766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:32.325032 kernel: audit: type=1327 audit(1746664892.316:731): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:41:32.316000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:41:32.333000 audit[2768]: NETFILTER_CFG table=filter:88 family=2 entries=32 op=nft_register_rule pid=2768 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:41:32.333000 audit[2768]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffe12d254f0 a2=0 a3=7ffe12d254dc items=0 ppid=1707 pid=2768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:32.342160 kernel: audit: type=1325 audit(1746664892.333:732): table=filter:88 family=2 entries=32 op=nft_register_rule pid=2768 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:41:32.342220 kernel: audit: type=1300 audit(1746664892.333:732): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffe12d254f0 a2=0 a3=7ffe12d254dc items=0 ppid=1707 pid=2768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:32.342243 kernel: audit: type=1327 audit(1746664892.333:732): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:41:32.333000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:41:32.345000 audit[2768]: NETFILTER_CFG table=nat:89 family=2 entries=22 op=nft_register_rule pid=2768 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:41:32.345000 audit[2768]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe12d254f0 a2=0 a3=0 items=0 ppid=1707 pid=2768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:32.345000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:41:32.350001 kernel: audit: type=1325 audit(1746664892.345:733): table=nat:89 family=2 entries=22 op=nft_register_rule pid=2768 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:41:32.374155 systemd[1]: Created slice kubepods-besteffort-pod69738230_5bfb_4593_973c_41fa32c24f53.slice. May 8 00:41:32.444300 kubelet[1450]: I0508 00:41:32.444213 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/69738230-5bfb-4593-973c-41fa32c24f53-data\") pod \"nfs-server-provisioner-0\" (UID: \"69738230-5bfb-4593-973c-41fa32c24f53\") " pod="default/nfs-server-provisioner-0" May 8 00:41:32.444300 kubelet[1450]: I0508 00:41:32.444291 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hf972\" (UniqueName: \"kubernetes.io/projected/69738230-5bfb-4593-973c-41fa32c24f53-kube-api-access-hf972\") pod \"nfs-server-provisioner-0\" (UID: \"69738230-5bfb-4593-973c-41fa32c24f53\") " pod="default/nfs-server-provisioner-0" May 8 00:41:32.677766 env[1196]: time="2025-05-08T00:41:32.677603076Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:69738230-5bfb-4593-973c-41fa32c24f53,Namespace:default,Attempt:0,}" May 8 00:41:32.836362 kubelet[1450]: E0508 00:41:32.836265 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:33.118916 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 8 00:41:33.119467 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready May 8 00:41:33.116288 systemd-networkd[1022]: cali60e51b789ff: Link UP May 8 00:41:33.119237 systemd-networkd[1022]: cali60e51b789ff: Gained carrier May 8 00:41:33.129518 env[1196]: 2025-05-08 00:41:33.045 [INFO][2770] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.33-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 69738230-5bfb-4593-973c-41fa32c24f53 1237 0 2025-05-08 00:41:32 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.0.0.33 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="bb1f1062451d4374de47f07aa280cfb8a3ec8673933717fcaa2d1a63a3f859e1" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.33-k8s-nfs--server--provisioner--0-" May 8 00:41:33.129518 env[1196]: 2025-05-08 00:41:33.045 [INFO][2770] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="bb1f1062451d4374de47f07aa280cfb8a3ec8673933717fcaa2d1a63a3f859e1" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.33-k8s-nfs--server--provisioner--0-eth0" May 8 00:41:33.129518 env[1196]: 2025-05-08 00:41:33.074 [INFO][2784] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="bb1f1062451d4374de47f07aa280cfb8a3ec8673933717fcaa2d1a63a3f859e1" HandleID="k8s-pod-network.bb1f1062451d4374de47f07aa280cfb8a3ec8673933717fcaa2d1a63a3f859e1" Workload="10.0.0.33-k8s-nfs--server--provisioner--0-eth0" May 8 00:41:33.129518 env[1196]: 2025-05-08 00:41:33.087 [INFO][2784] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="bb1f1062451d4374de47f07aa280cfb8a3ec8673933717fcaa2d1a63a3f859e1" HandleID="k8s-pod-network.bb1f1062451d4374de47f07aa280cfb8a3ec8673933717fcaa2d1a63a3f859e1" Workload="10.0.0.33-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ed8a0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.33", "pod":"nfs-server-provisioner-0", "timestamp":"2025-05-08 00:41:33.074065901 +0000 UTC"}, Hostname:"10.0.0.33", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 8 00:41:33.129518 env[1196]: 2025-05-08 00:41:33.087 [INFO][2784] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:41:33.129518 env[1196]: 2025-05-08 00:41:33.087 [INFO][2784] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:41:33.129518 env[1196]: 2025-05-08 00:41:33.087 [INFO][2784] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.33' May 8 00:41:33.129518 env[1196]: 2025-05-08 00:41:33.089 [INFO][2784] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.bb1f1062451d4374de47f07aa280cfb8a3ec8673933717fcaa2d1a63a3f859e1" host="10.0.0.33" May 8 00:41:33.129518 env[1196]: 2025-05-08 00:41:33.093 [INFO][2784] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.33" May 8 00:41:33.129518 env[1196]: 2025-05-08 00:41:33.097 [INFO][2784] ipam/ipam.go 489: Trying affinity for 192.168.91.128/26 host="10.0.0.33" May 8 00:41:33.129518 env[1196]: 2025-05-08 00:41:33.099 [INFO][2784] ipam/ipam.go 155: Attempting to load block cidr=192.168.91.128/26 host="10.0.0.33" May 8 00:41:33.129518 env[1196]: 2025-05-08 00:41:33.101 [INFO][2784] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.91.128/26 host="10.0.0.33" May 8 00:41:33.129518 env[1196]: 2025-05-08 00:41:33.101 [INFO][2784] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.91.128/26 handle="k8s-pod-network.bb1f1062451d4374de47f07aa280cfb8a3ec8673933717fcaa2d1a63a3f859e1" host="10.0.0.33" May 8 00:41:33.129518 env[1196]: 2025-05-08 00:41:33.103 [INFO][2784] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.bb1f1062451d4374de47f07aa280cfb8a3ec8673933717fcaa2d1a63a3f859e1 May 8 00:41:33.129518 env[1196]: 2025-05-08 00:41:33.106 [INFO][2784] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.91.128/26 handle="k8s-pod-network.bb1f1062451d4374de47f07aa280cfb8a3ec8673933717fcaa2d1a63a3f859e1" host="10.0.0.33" May 8 00:41:33.129518 env[1196]: 2025-05-08 00:41:33.112 [INFO][2784] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.91.131/26] block=192.168.91.128/26 handle="k8s-pod-network.bb1f1062451d4374de47f07aa280cfb8a3ec8673933717fcaa2d1a63a3f859e1" host="10.0.0.33" May 8 00:41:33.129518 env[1196]: 2025-05-08 00:41:33.112 [INFO][2784] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.91.131/26] handle="k8s-pod-network.bb1f1062451d4374de47f07aa280cfb8a3ec8673933717fcaa2d1a63a3f859e1" host="10.0.0.33" May 8 00:41:33.129518 env[1196]: 2025-05-08 00:41:33.112 [INFO][2784] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:41:33.129518 env[1196]: 2025-05-08 00:41:33.112 [INFO][2784] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.91.131/26] IPv6=[] ContainerID="bb1f1062451d4374de47f07aa280cfb8a3ec8673933717fcaa2d1a63a3f859e1" HandleID="k8s-pod-network.bb1f1062451d4374de47f07aa280cfb8a3ec8673933717fcaa2d1a63a3f859e1" Workload="10.0.0.33-k8s-nfs--server--provisioner--0-eth0" May 8 00:41:33.130332 env[1196]: 2025-05-08 00:41:33.114 [INFO][2770] cni-plugin/k8s.go 386: Populated endpoint ContainerID="bb1f1062451d4374de47f07aa280cfb8a3ec8673933717fcaa2d1a63a3f859e1" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.33-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.33-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"69738230-5bfb-4593-973c-41fa32c24f53", ResourceVersion:"1237", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 41, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.33", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.91.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:41:33.130332 env[1196]: 2025-05-08 00:41:33.114 [INFO][2770] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.91.131/32] ContainerID="bb1f1062451d4374de47f07aa280cfb8a3ec8673933717fcaa2d1a63a3f859e1" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.33-k8s-nfs--server--provisioner--0-eth0" May 8 00:41:33.130332 env[1196]: 2025-05-08 00:41:33.114 [INFO][2770] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="bb1f1062451d4374de47f07aa280cfb8a3ec8673933717fcaa2d1a63a3f859e1" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.33-k8s-nfs--server--provisioner--0-eth0" May 8 00:41:33.130332 env[1196]: 2025-05-08 00:41:33.119 [INFO][2770] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="bb1f1062451d4374de47f07aa280cfb8a3ec8673933717fcaa2d1a63a3f859e1" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.33-k8s-nfs--server--provisioner--0-eth0" May 8 00:41:33.130544 env[1196]: 2025-05-08 00:41:33.119 [INFO][2770] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="bb1f1062451d4374de47f07aa280cfb8a3ec8673933717fcaa2d1a63a3f859e1" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.33-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.33-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"69738230-5bfb-4593-973c-41fa32c24f53", ResourceVersion:"1237", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 41, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.33", ContainerID:"bb1f1062451d4374de47f07aa280cfb8a3ec8673933717fcaa2d1a63a3f859e1", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.91.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"4e:60:e5:97:ab:ad", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:41:33.130544 env[1196]: 2025-05-08 00:41:33.127 [INFO][2770] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="bb1f1062451d4374de47f07aa280cfb8a3ec8673933717fcaa2d1a63a3f859e1" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.33-k8s-nfs--server--provisioner--0-eth0" May 8 00:41:33.139000 audit[2810]: NETFILTER_CFG table=filter:90 family=2 entries=38 op=nft_register_chain pid=2810 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:41:33.139000 audit[2810]: SYSCALL arch=c000003e syscall=46 success=yes exit=19820 a0=3 a1=7ffee02e9dd0 a2=0 a3=7ffee02e9dbc items=0 ppid=2295 pid=2810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:33.139000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:41:33.146636 env[1196]: time="2025-05-08T00:41:33.146564564Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:41:33.146636 env[1196]: time="2025-05-08T00:41:33.146610951Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:41:33.146781 env[1196]: time="2025-05-08T00:41:33.146622142Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:41:33.147142 env[1196]: time="2025-05-08T00:41:33.147065756Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bb1f1062451d4374de47f07aa280cfb8a3ec8673933717fcaa2d1a63a3f859e1 pid=2818 runtime=io.containerd.runc.v2 May 8 00:41:33.160328 systemd[1]: Started cri-containerd-bb1f1062451d4374de47f07aa280cfb8a3ec8673933717fcaa2d1a63a3f859e1.scope. May 8 00:41:33.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:33.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:33.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:33.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:33.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:33.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:33.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:33.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:33.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:33.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:33.173000 audit: BPF prog-id=118 op=LOAD May 8 00:41:33.173000 audit[2829]: AVC avc: denied { bpf } for pid=2829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:33.173000 audit[2829]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2818 pid=2829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:33.173000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262316631303632343531643433373464653437663037616132383063 May 8 00:41:33.173000 audit[2829]: AVC avc: denied { perfmon } for pid=2829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:33.173000 audit[2829]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2818 pid=2829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:33.173000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262316631303632343531643433373464653437663037616132383063 May 8 00:41:33.173000 audit[2829]: AVC avc: denied { bpf } for pid=2829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:33.173000 audit[2829]: AVC avc: denied { bpf } for pid=2829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:33.173000 audit[2829]: AVC avc: denied { bpf } for pid=2829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:33.173000 audit[2829]: AVC avc: denied { perfmon } for pid=2829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:33.173000 audit[2829]: AVC avc: denied { perfmon } for pid=2829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:33.173000 audit[2829]: AVC avc: denied { perfmon } for pid=2829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:33.173000 audit[2829]: AVC avc: denied { perfmon } for pid=2829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:33.173000 audit[2829]: AVC avc: denied { perfmon } for pid=2829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:33.173000 audit[2829]: AVC avc: denied { bpf } for pid=2829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:33.173000 audit[2829]: AVC avc: denied { bpf } for pid=2829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:33.173000 audit: BPF prog-id=119 op=LOAD May 8 00:41:33.173000 audit[2829]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001e7ce0 items=0 ppid=2818 pid=2829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:33.173000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262316631303632343531643433373464653437663037616132383063 May 8 00:41:33.174000 audit[2829]: AVC avc: denied { bpf } for pid=2829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:33.174000 audit[2829]: AVC avc: denied { bpf } for pid=2829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:33.174000 audit[2829]: AVC avc: denied { perfmon } for pid=2829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:33.174000 audit[2829]: AVC avc: denied { perfmon } for pid=2829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:33.174000 audit[2829]: AVC avc: denied { perfmon } for pid=2829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:33.174000 audit[2829]: AVC avc: denied { perfmon } for pid=2829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:33.174000 audit[2829]: AVC avc: denied { perfmon } for pid=2829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:33.174000 audit[2829]: AVC avc: denied { bpf } for pid=2829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:33.174000 audit[2829]: AVC avc: denied { bpf } for pid=2829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:33.174000 audit: BPF prog-id=120 op=LOAD May 8 00:41:33.174000 audit[2829]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001e7d28 items=0 ppid=2818 pid=2829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:33.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262316631303632343531643433373464653437663037616132383063 May 8 00:41:33.174000 audit: BPF prog-id=120 op=UNLOAD May 8 00:41:33.174000 audit: BPF prog-id=119 op=UNLOAD May 8 00:41:33.174000 audit[2829]: AVC avc: denied { bpf } for pid=2829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:33.174000 audit[2829]: AVC avc: denied { bpf } for pid=2829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:33.174000 audit[2829]: AVC avc: denied { bpf } for pid=2829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:33.174000 audit[2829]: AVC avc: denied { perfmon } for pid=2829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:33.174000 audit[2829]: AVC avc: denied { perfmon } for pid=2829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:33.174000 audit[2829]: AVC avc: denied { perfmon } for pid=2829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:33.174000 audit[2829]: AVC avc: denied { perfmon } for pid=2829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:33.174000 audit[2829]: AVC avc: denied { perfmon } for pid=2829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:33.174000 audit[2829]: AVC avc: denied { bpf } for pid=2829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:33.174000 audit[2829]: AVC avc: denied { bpf } for pid=2829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:33.174000 audit: BPF prog-id=121 op=LOAD May 8 00:41:33.174000 audit[2829]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00036c138 items=0 ppid=2818 pid=2829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:33.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262316631303632343531643433373464653437663037616132383063 May 8 00:41:33.176085 systemd-resolved[1149]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 8 00:41:33.198603 env[1196]: time="2025-05-08T00:41:33.198540415Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:69738230-5bfb-4593-973c-41fa32c24f53,Namespace:default,Attempt:0,} returns sandbox id \"bb1f1062451d4374de47f07aa280cfb8a3ec8673933717fcaa2d1a63a3f859e1\"" May 8 00:41:33.200014 env[1196]: time="2025-05-08T00:41:33.199993475Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" May 8 00:41:33.837003 kubelet[1450]: E0508 00:41:33.836888 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:34.837924 kubelet[1450]: E0508 00:41:34.837864 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:34.970181 systemd-networkd[1022]: cali60e51b789ff: Gained IPv6LL May 8 00:41:35.797709 kubelet[1450]: E0508 00:41:35.797642 1450 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:35.838992 kubelet[1450]: E0508 00:41:35.838695 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:35.844435 env[1196]: time="2025-05-08T00:41:35.844383068Z" level=info msg="StopPodSandbox for \"91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e\"" May 8 00:41:35.930135 env[1196]: 2025-05-08 00:41:35.899 [WARNING][2871] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.33-k8s-nginx--deployment--7fcdb87857--jhz2q-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"e6df658e-6f40-435e-a1c0-431211d0175d", ResourceVersion:"1201", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 41, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.33", ContainerID:"7f2fbd9d5d1aeb28477bc8be4f7165690ed9fc4ce0f13ed6a93bcb5a0535eba8", Pod:"nginx-deployment-7fcdb87857-jhz2q", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.91.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calicfeeea98b4c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:41:35.930135 env[1196]: 2025-05-08 00:41:35.899 [INFO][2871] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e" May 8 00:41:35.930135 env[1196]: 2025-05-08 00:41:35.899 [INFO][2871] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e" iface="eth0" netns="" May 8 00:41:35.930135 env[1196]: 2025-05-08 00:41:35.899 [INFO][2871] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e" May 8 00:41:35.930135 env[1196]: 2025-05-08 00:41:35.899 [INFO][2871] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e" May 8 00:41:35.930135 env[1196]: 2025-05-08 00:41:35.919 [INFO][2879] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e" HandleID="k8s-pod-network.91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e" Workload="10.0.0.33-k8s-nginx--deployment--7fcdb87857--jhz2q-eth0" May 8 00:41:35.930135 env[1196]: 2025-05-08 00:41:35.920 [INFO][2879] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:41:35.930135 env[1196]: 2025-05-08 00:41:35.920 [INFO][2879] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:41:35.930135 env[1196]: 2025-05-08 00:41:35.926 [WARNING][2879] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e" HandleID="k8s-pod-network.91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e" Workload="10.0.0.33-k8s-nginx--deployment--7fcdb87857--jhz2q-eth0" May 8 00:41:35.930135 env[1196]: 2025-05-08 00:41:35.926 [INFO][2879] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e" HandleID="k8s-pod-network.91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e" Workload="10.0.0.33-k8s-nginx--deployment--7fcdb87857--jhz2q-eth0" May 8 00:41:35.930135 env[1196]: 2025-05-08 00:41:35.927 [INFO][2879] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:41:35.930135 env[1196]: 2025-05-08 00:41:35.928 [INFO][2871] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e" May 8 00:41:35.930674 env[1196]: time="2025-05-08T00:41:35.930222626Z" level=info msg="TearDown network for sandbox \"91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e\" successfully" May 8 00:41:35.930674 env[1196]: time="2025-05-08T00:41:35.930269715Z" level=info msg="StopPodSandbox for \"91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e\" returns successfully" May 8 00:41:35.930875 env[1196]: time="2025-05-08T00:41:35.930835678Z" level=info msg="RemovePodSandbox for \"91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e\"" May 8 00:41:35.931075 env[1196]: time="2025-05-08T00:41:35.930870914Z" level=info msg="Forcibly stopping sandbox \"91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e\"" May 8 00:41:36.070805 env[1196]: 2025-05-08 00:41:36.039 [WARNING][2901] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.33-k8s-nginx--deployment--7fcdb87857--jhz2q-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"e6df658e-6f40-435e-a1c0-431211d0175d", ResourceVersion:"1201", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 41, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.33", ContainerID:"7f2fbd9d5d1aeb28477bc8be4f7165690ed9fc4ce0f13ed6a93bcb5a0535eba8", Pod:"nginx-deployment-7fcdb87857-jhz2q", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.91.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calicfeeea98b4c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:41:36.070805 env[1196]: 2025-05-08 00:41:36.039 [INFO][2901] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e" May 8 00:41:36.070805 env[1196]: 2025-05-08 00:41:36.039 [INFO][2901] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e" iface="eth0" netns="" May 8 00:41:36.070805 env[1196]: 2025-05-08 00:41:36.039 [INFO][2901] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e" May 8 00:41:36.070805 env[1196]: 2025-05-08 00:41:36.039 [INFO][2901] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e" May 8 00:41:36.070805 env[1196]: 2025-05-08 00:41:36.059 [INFO][2910] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e" HandleID="k8s-pod-network.91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e" Workload="10.0.0.33-k8s-nginx--deployment--7fcdb87857--jhz2q-eth0" May 8 00:41:36.070805 env[1196]: 2025-05-08 00:41:36.059 [INFO][2910] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:41:36.070805 env[1196]: 2025-05-08 00:41:36.059 [INFO][2910] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:41:36.070805 env[1196]: 2025-05-08 00:41:36.066 [WARNING][2910] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e" HandleID="k8s-pod-network.91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e" Workload="10.0.0.33-k8s-nginx--deployment--7fcdb87857--jhz2q-eth0" May 8 00:41:36.070805 env[1196]: 2025-05-08 00:41:36.066 [INFO][2910] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e" HandleID="k8s-pod-network.91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e" Workload="10.0.0.33-k8s-nginx--deployment--7fcdb87857--jhz2q-eth0" May 8 00:41:36.070805 env[1196]: 2025-05-08 00:41:36.068 [INFO][2910] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:41:36.070805 env[1196]: 2025-05-08 00:41:36.069 [INFO][2901] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e" May 8 00:41:36.070805 env[1196]: time="2025-05-08T00:41:36.070754721Z" level=info msg="TearDown network for sandbox \"91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e\" successfully" May 8 00:41:36.553784 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1088746876.mount: Deactivated successfully. May 8 00:41:36.839216 kubelet[1450]: E0508 00:41:36.839022 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:37.410076 env[1196]: time="2025-05-08T00:41:37.409953323Z" level=info msg="RemovePodSandbox \"91fbacc93b5bea3fc5cebe08c3f8265eb8b544b477296e9302acc4c15674460e\" returns successfully" May 8 00:41:37.410791 env[1196]: time="2025-05-08T00:41:37.410769065Z" level=info msg="StopPodSandbox for \"7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e\"" May 8 00:41:37.511795 env[1196]: 2025-05-08 00:41:37.477 [WARNING][2933] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.33-k8s-csi--node--driver--pm8mh-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"2800af31-37f6-43fa-b72f-454be6588432", ResourceVersion:"1177", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 40, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.33", ContainerID:"b09d620f71eddb24ddbd19f438c29fc9454a101cd4fc1aae55ed60b8e0df1583", Pod:"csi-node-driver-pm8mh", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.91.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali1616c835726", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:41:37.511795 env[1196]: 2025-05-08 00:41:37.477 [INFO][2933] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e" May 8 00:41:37.511795 env[1196]: 2025-05-08 00:41:37.477 [INFO][2933] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e" iface="eth0" netns="" May 8 00:41:37.511795 env[1196]: 2025-05-08 00:41:37.477 [INFO][2933] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e" May 8 00:41:37.511795 env[1196]: 2025-05-08 00:41:37.477 [INFO][2933] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e" May 8 00:41:37.511795 env[1196]: 2025-05-08 00:41:37.498 [INFO][2941] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e" HandleID="k8s-pod-network.7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e" Workload="10.0.0.33-k8s-csi--node--driver--pm8mh-eth0" May 8 00:41:37.511795 env[1196]: 2025-05-08 00:41:37.499 [INFO][2941] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:41:37.511795 env[1196]: 2025-05-08 00:41:37.499 [INFO][2941] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:41:37.511795 env[1196]: 2025-05-08 00:41:37.506 [WARNING][2941] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e" HandleID="k8s-pod-network.7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e" Workload="10.0.0.33-k8s-csi--node--driver--pm8mh-eth0" May 8 00:41:37.511795 env[1196]: 2025-05-08 00:41:37.507 [INFO][2941] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e" HandleID="k8s-pod-network.7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e" Workload="10.0.0.33-k8s-csi--node--driver--pm8mh-eth0" May 8 00:41:37.511795 env[1196]: 2025-05-08 00:41:37.509 [INFO][2941] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:41:37.511795 env[1196]: 2025-05-08 00:41:37.510 [INFO][2933] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e" May 8 00:41:37.512326 env[1196]: time="2025-05-08T00:41:37.511837609Z" level=info msg="TearDown network for sandbox \"7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e\" successfully" May 8 00:41:37.512326 env[1196]: time="2025-05-08T00:41:37.511883495Z" level=info msg="StopPodSandbox for \"7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e\" returns successfully" May 8 00:41:37.512569 env[1196]: time="2025-05-08T00:41:37.512534167Z" level=info msg="RemovePodSandbox for \"7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e\"" May 8 00:41:37.512622 env[1196]: time="2025-05-08T00:41:37.512578671Z" level=info msg="Forcibly stopping sandbox \"7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e\"" May 8 00:41:37.580355 env[1196]: 2025-05-08 00:41:37.549 [WARNING][2964] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.33-k8s-csi--node--driver--pm8mh-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"2800af31-37f6-43fa-b72f-454be6588432", ResourceVersion:"1177", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 40, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.33", ContainerID:"b09d620f71eddb24ddbd19f438c29fc9454a101cd4fc1aae55ed60b8e0df1583", Pod:"csi-node-driver-pm8mh", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.91.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali1616c835726", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:41:37.580355 env[1196]: 2025-05-08 00:41:37.549 [INFO][2964] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e" May 8 00:41:37.580355 env[1196]: 2025-05-08 00:41:37.549 [INFO][2964] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e" iface="eth0" netns="" May 8 00:41:37.580355 env[1196]: 2025-05-08 00:41:37.549 [INFO][2964] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e" May 8 00:41:37.580355 env[1196]: 2025-05-08 00:41:37.549 [INFO][2964] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e" May 8 00:41:37.580355 env[1196]: 2025-05-08 00:41:37.569 [INFO][2972] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e" HandleID="k8s-pod-network.7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e" Workload="10.0.0.33-k8s-csi--node--driver--pm8mh-eth0" May 8 00:41:37.580355 env[1196]: 2025-05-08 00:41:37.569 [INFO][2972] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:41:37.580355 env[1196]: 2025-05-08 00:41:37.569 [INFO][2972] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:41:37.580355 env[1196]: 2025-05-08 00:41:37.576 [WARNING][2972] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e" HandleID="k8s-pod-network.7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e" Workload="10.0.0.33-k8s-csi--node--driver--pm8mh-eth0" May 8 00:41:37.580355 env[1196]: 2025-05-08 00:41:37.576 [INFO][2972] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e" HandleID="k8s-pod-network.7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e" Workload="10.0.0.33-k8s-csi--node--driver--pm8mh-eth0" May 8 00:41:37.580355 env[1196]: 2025-05-08 00:41:37.577 [INFO][2972] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:41:37.580355 env[1196]: 2025-05-08 00:41:37.579 [INFO][2964] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e" May 8 00:41:37.581046 env[1196]: time="2025-05-08T00:41:37.580375257Z" level=info msg="TearDown network for sandbox \"7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e\" successfully" May 8 00:41:37.733794 env[1196]: time="2025-05-08T00:41:37.733630712Z" level=info msg="RemovePodSandbox \"7759e87488e57543210ce47a8dc1f7d489d1b157027d6a5b39b735dc33f6f11e\" returns successfully" May 8 00:41:37.840028 kubelet[1450]: E0508 00:41:37.839931 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:38.841060 kubelet[1450]: E0508 00:41:38.840941 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:39.841498 kubelet[1450]: E0508 00:41:39.841424 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:40.515404 env[1196]: time="2025-05-08T00:41:40.515327876Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:41:40.522400 env[1196]: time="2025-05-08T00:41:40.522326330Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:41:40.525171 env[1196]: time="2025-05-08T00:41:40.525116090Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:41:40.528185 env[1196]: time="2025-05-08T00:41:40.528148014Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:41:40.528989 env[1196]: time="2025-05-08T00:41:40.528912590Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" May 8 00:41:40.532275 env[1196]: time="2025-05-08T00:41:40.532232114Z" level=info msg="CreateContainer within sandbox \"bb1f1062451d4374de47f07aa280cfb8a3ec8673933717fcaa2d1a63a3f859e1\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" May 8 00:41:40.550201 env[1196]: time="2025-05-08T00:41:40.550122144Z" level=info msg="CreateContainer within sandbox \"bb1f1062451d4374de47f07aa280cfb8a3ec8673933717fcaa2d1a63a3f859e1\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"66c936466e11762ae719dbdc3163536fdd42d2e0e1e6adfa03d17a65348e32d8\"" May 8 00:41:40.550882 env[1196]: time="2025-05-08T00:41:40.550836987Z" level=info msg="StartContainer for \"66c936466e11762ae719dbdc3163536fdd42d2e0e1e6adfa03d17a65348e32d8\"" May 8 00:41:40.571688 systemd[1]: run-containerd-runc-k8s.io-66c936466e11762ae719dbdc3163536fdd42d2e0e1e6adfa03d17a65348e32d8-runc.06lAxE.mount: Deactivated successfully. May 8 00:41:40.574346 systemd[1]: Started cri-containerd-66c936466e11762ae719dbdc3163536fdd42d2e0e1e6adfa03d17a65348e32d8.scope. May 8 00:41:40.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:40.587877 kernel: kauditd_printk_skb: 62 callbacks suppressed May 8 00:41:40.587979 kernel: audit: type=1400 audit(1746664900.585:753): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:40.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:40.596015 kernel: audit: type=1400 audit(1746664900.585:754): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:40.596182 kernel: audit: type=1400 audit(1746664900.585:755): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:40.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:40.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:40.602471 kernel: audit: type=1400 audit(1746664900.585:756): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:40.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:40.606109 kernel: audit: type=1400 audit(1746664900.585:757): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:40.606201 kernel: audit: type=1400 audit(1746664900.585:758): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:40.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:40.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:40.613106 kernel: audit: type=1400 audit(1746664900.585:759): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:40.613220 kernel: audit: type=1400 audit(1746664900.585:760): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:40.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:40.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:40.619034 kernel: audit: type=1400 audit(1746664900.585:761): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:40.619091 kernel: audit: type=1400 audit(1746664900.591:762): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:40.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:40.591000 audit: BPF prog-id=122 op=LOAD May 8 00:41:40.591000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:40.591000 audit[2991]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2818 pid=2991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:40.591000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636633933363436366531313736326165373139646264633331363335 May 8 00:41:40.591000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:40.591000 audit[2991]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2818 pid=2991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:40.591000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636633933363436366531313736326165373139646264633331363335 May 8 00:41:40.591000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:40.591000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:40.591000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:40.591000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:40.591000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:40.591000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:40.591000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:40.591000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:40.591000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:40.591000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:40.591000 audit: BPF prog-id=123 op=LOAD May 8 00:41:40.591000 audit[2991]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0002172c0 items=0 ppid=2818 pid=2991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:40.591000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636633933363436366531313736326165373139646264633331363335 May 8 00:41:40.594000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:40.594000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:40.594000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:40.594000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:40.594000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:40.594000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:40.594000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:40.594000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:40.594000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:40.594000 audit: BPF prog-id=124 op=LOAD May 8 00:41:40.594000 audit[2991]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000217308 items=0 ppid=2818 pid=2991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:40.594000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636633933363436366531313736326165373139646264633331363335 May 8 00:41:40.601000 audit: BPF prog-id=124 op=UNLOAD May 8 00:41:40.601000 audit: BPF prog-id=123 op=UNLOAD May 8 00:41:40.601000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:40.601000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:40.601000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:40.601000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:40.601000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:40.601000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:40.601000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:40.601000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:40.601000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:40.601000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:40.601000 audit: BPF prog-id=125 op=LOAD May 8 00:41:40.601000 audit[2991]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000217718 items=0 ppid=2818 pid=2991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:40.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636633933363436366531313736326165373139646264633331363335 May 8 00:41:40.635017 env[1196]: time="2025-05-08T00:41:40.632608846Z" level=info msg="StartContainer for \"66c936466e11762ae719dbdc3163536fdd42d2e0e1e6adfa03d17a65348e32d8\" returns successfully" May 8 00:41:40.671000 audit[3020]: AVC avc: denied { search } for pid=3020 comm="rpcbind" name="crypto" dev="proc" ino=25721 scontext=system_u:system_r:svirt_lxc_net_t:s0:c364,c903 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 8 00:41:40.671000 audit[3020]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f0debcdb0c0 a2=0 a3=0 items=0 ppid=3001 pid=3020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c364,c903 key=(null) May 8 00:41:40.671000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 May 8 00:41:40.716000 audit[3025]: AVC avc: denied { search } for pid=3025 comm="dbus-daemon" name="crypto" dev="proc" ino=25721 scontext=system_u:system_r:svirt_lxc_net_t:s0:c364,c903 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 8 00:41:40.716000 audit[3025]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fa2cf3460c0 a2=0 a3=0 items=0 ppid=3001 pid=3025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c364,c903 key=(null) May 8 00:41:40.716000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 8 00:41:40.719000 audit[3026]: AVC avc: denied { watch } for pid=3026 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538165 scontext=system_u:system_r:svirt_lxc_net_t:s0:c364,c903 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c364,c903 tclass=dir permissive=0 May 8 00:41:40.719000 audit[3026]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=555d3be6fff0 a2=2c8 a3=7ffdacac206c items=0 ppid=3001 pid=3026 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c364,c903 key=(null) May 8 00:41:40.719000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 May 8 00:41:40.722000 audit[3027]: AVC avc: denied { read } for pid=3027 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=25746 scontext=system_u:system_r:svirt_lxc_net_t:s0:c364,c903 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 May 8 00:41:40.722000 audit[3027]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f691fd62320 a1=80000 a2=d a3=7ffc8ff14450 items=0 ppid=3001 pid=3027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c364,c903 key=(null) May 8 00:41:40.722000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 8 00:41:40.723000 audit[3027]: AVC avc: denied { search } for pid=3027 comm="ganesha.nfsd" name="crypto" dev="proc" ino=25721 scontext=system_u:system_r:svirt_lxc_net_t:s0:c364,c903 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 May 8 00:41:40.723000 audit[3027]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f691f2b60c0 a2=0 a3=0 items=0 ppid=3001 pid=3027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c364,c903 key=(null) May 8 00:41:40.723000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 May 8 00:41:40.841959 kubelet[1450]: E0508 00:41:40.841879 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:41.498478 kubelet[1450]: I0508 00:41:41.498390 1450 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=2.16758363 podStartE2EDuration="9.498364753s" podCreationTimestamp="2025-05-08 00:41:32 +0000 UTC" firstStartedPulling="2025-05-08 00:41:33.199685847 +0000 UTC m=+59.029626364" lastFinishedPulling="2025-05-08 00:41:40.530466959 +0000 UTC m=+66.360407487" observedRunningTime="2025-05-08 00:41:41.498200985 +0000 UTC m=+67.328141532" watchObservedRunningTime="2025-05-08 00:41:41.498364753 +0000 UTC m=+67.328305280" May 8 00:41:41.512000 audit[3047]: NETFILTER_CFG table=filter:91 family=2 entries=20 op=nft_register_rule pid=3047 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:41:41.512000 audit[3047]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fff5b54f710 a2=0 a3=7fff5b54f6fc items=0 ppid=1707 pid=3047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:41.512000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:41:41.525000 audit[3047]: NETFILTER_CFG table=nat:92 family=2 entries=106 op=nft_register_chain pid=3047 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 8 00:41:41.525000 audit[3047]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fff5b54f710 a2=0 a3=7fff5b54f6fc items=0 ppid=1707 pid=3047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:41.525000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 8 00:41:41.842615 kubelet[1450]: E0508 00:41:41.842522 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:42.843158 kubelet[1450]: E0508 00:41:42.843076 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:43.843639 kubelet[1450]: E0508 00:41:43.843517 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:44.275667 kubelet[1450]: E0508 00:41:44.275550 1450 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:41:44.844180 kubelet[1450]: E0508 00:41:44.844102 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:45.845381 kubelet[1450]: E0508 00:41:45.845305 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:46.846610 kubelet[1450]: E0508 00:41:46.846523 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:47.847046 kubelet[1450]: E0508 00:41:47.846838 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:48.847422 kubelet[1450]: E0508 00:41:48.847310 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:49.848170 kubelet[1450]: E0508 00:41:49.848085 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:50.848199 kubelet[1450]: E0508 00:41:50.848161 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:50.850116 systemd[1]: Created slice kubepods-besteffort-podd0a163f8_a9b6_49c8_8f5e_9c5e34ebf374.slice. May 8 00:41:51.066169 kubelet[1450]: I0508 00:41:51.066097 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ttshh\" (UniqueName: \"kubernetes.io/projected/d0a163f8-a9b6-49c8-8f5e-9c5e34ebf374-kube-api-access-ttshh\") pod \"test-pod-1\" (UID: \"d0a163f8-a9b6-49c8-8f5e-9c5e34ebf374\") " pod="default/test-pod-1" May 8 00:41:51.066169 kubelet[1450]: I0508 00:41:51.066143 1450 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-c1629ca5-bfcc-4454-9357-f57f90c1df35\" (UniqueName: \"kubernetes.io/nfs/d0a163f8-a9b6-49c8-8f5e-9c5e34ebf374-pvc-c1629ca5-bfcc-4454-9357-f57f90c1df35\") pod \"test-pod-1\" (UID: \"d0a163f8-a9b6-49c8-8f5e-9c5e34ebf374\") " pod="default/test-pod-1" May 8 00:41:51.229000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.310201 kernel: Failed to create system directory netfs May 8 00:41:51.310428 kernel: kauditd_printk_skb: 68 callbacks suppressed May 8 00:41:51.310492 kernel: audit: type=1400 audit(1746664911.229:778): avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.310545 kernel: Failed to create system directory netfs May 8 00:41:51.311116 kernel: audit: type=1400 audit(1746664911.229:778): avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.229000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.229000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.423525 kernel: Failed to create system directory netfs May 8 00:41:51.423567 kernel: audit: type=1400 audit(1746664911.229:778): avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.423615 kernel: Failed to create system directory netfs May 8 00:41:51.229000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.428698 kernel: audit: type=1400 audit(1746664911.229:778): avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.229000 audit[3079]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5617e78235e0 a1=153bc a2=5617d97a02b0 a3=5 items=0 ppid=67 pid=3079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:51.229000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 8 00:41:51.453279 kernel: audit: type=1300 audit(1746664911.229:778): arch=c000003e syscall=175 success=yes exit=0 a0=5617e78235e0 a1=153bc a2=5617d97a02b0 a3=5 items=0 ppid=67 pid=3079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:51.453345 kernel: audit: type=1327 audit(1746664911.229:778): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 8 00:41:51.469000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.533244 kernel: Failed to create system directory fscache May 8 00:41:51.533403 kernel: audit: type=1400 audit(1746664911.469:779): avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.533434 kernel: Failed to create system directory fscache May 8 00:41:51.533449 kernel: audit: type=1400 audit(1746664911.469:779): avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.469000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.538042 kernel: Failed to create system directory fscache May 8 00:41:51.538219 kernel: audit: type=1400 audit(1746664911.469:779): avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.469000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.566505 kernel: Failed to create system directory fscache May 8 00:41:51.566553 kernel: audit: type=1400 audit(1746664911.469:779): avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.469000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.469000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.572113 kernel: Failed to create system directory fscache May 8 00:41:51.469000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.573451 kernel: Failed to create system directory fscache May 8 00:41:51.573489 kernel: Failed to create system directory fscache May 8 00:41:51.469000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.469000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.575000 kernel: Failed to create system directory fscache May 8 00:41:51.575028 kernel: Failed to create system directory fscache May 8 00:41:51.469000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.469000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.576513 kernel: Failed to create system directory fscache May 8 00:41:51.576572 kernel: Failed to create system directory fscache May 8 00:41:51.469000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.469000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.578024 kernel: Failed to create system directory fscache May 8 00:41:51.578068 kernel: Failed to create system directory fscache May 8 00:41:51.469000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.469000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.579474 kernel: Failed to create system directory fscache May 8 00:41:51.469000 audit[3079]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5617e7a389c0 a1=4c0fc a2=5617d97a02b0 a3=5 items=0 ppid=67 pid=3079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:51.469000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 8 00:41:51.582001 kernel: FS-Cache: Loaded May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.651562 kernel: Failed to create system directory sunrpc May 8 00:41:51.651611 kernel: Failed to create system directory sunrpc May 8 00:41:51.651627 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.653030 kernel: Failed to create system directory sunrpc May 8 00:41:51.653063 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.654500 kernel: Failed to create system directory sunrpc May 8 00:41:51.654538 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.656687 kernel: Failed to create system directory sunrpc May 8 00:41:51.656714 kernel: Failed to create system directory sunrpc May 8 00:41:51.656744 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.657450 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.711366 kernel: Failed to create system directory sunrpc May 8 00:41:51.711415 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.713013 kernel: Failed to create system directory sunrpc May 8 00:41:51.713049 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.714691 kernel: Failed to create system directory sunrpc May 8 00:41:51.714742 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.716339 kernel: Failed to create system directory sunrpc May 8 00:41:51.716363 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.718011 kernel: Failed to create system directory sunrpc May 8 00:41:51.718041 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.719652 kernel: Failed to create system directory sunrpc May 8 00:41:51.719686 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.721397 kernel: Failed to create system directory sunrpc May 8 00:41:51.721436 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.723046 kernel: Failed to create system directory sunrpc May 8 00:41:51.723079 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.724632 kernel: Failed to create system directory sunrpc May 8 00:41:51.724692 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.726228 kernel: Failed to create system directory sunrpc May 8 00:41:51.726277 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.728691 kernel: Failed to create system directory sunrpc May 8 00:41:51.728730 kernel: Failed to create system directory sunrpc May 8 00:41:51.728744 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.730390 kernel: Failed to create system directory sunrpc May 8 00:41:51.730435 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.732068 kernel: Failed to create system directory sunrpc May 8 00:41:51.732095 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.733727 kernel: Failed to create system directory sunrpc May 8 00:41:51.733756 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.735319 kernel: Failed to create system directory sunrpc May 8 00:41:51.735360 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.737779 kernel: Failed to create system directory sunrpc May 8 00:41:51.737826 kernel: Failed to create system directory sunrpc May 8 00:41:51.737843 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.739487 kernel: Failed to create system directory sunrpc May 8 00:41:51.739516 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.740339 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.741991 kernel: Failed to create system directory sunrpc May 8 00:41:51.742022 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.743607 kernel: Failed to create system directory sunrpc May 8 00:41:51.743642 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.745263 kernel: Failed to create system directory sunrpc May 8 00:41:51.745308 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.746996 kernel: Failed to create system directory sunrpc May 8 00:41:51.747041 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.792280 kernel: Failed to create system directory sunrpc May 8 00:41:51.792345 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.794036 kernel: Failed to create system directory sunrpc May 8 00:41:51.794070 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.795543 kernel: Failed to create system directory sunrpc May 8 00:41:51.795576 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.797071 kernel: Failed to create system directory sunrpc May 8 00:41:51.797099 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.798622 kernel: Failed to create system directory sunrpc May 8 00:41:51.798650 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.800126 kernel: Failed to create system directory sunrpc May 8 00:41:51.800153 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.801689 kernel: Failed to create system directory sunrpc May 8 00:41:51.801715 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.803204 kernel: Failed to create system directory sunrpc May 8 00:41:51.803226 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.804738 kernel: Failed to create system directory sunrpc May 8 00:41:51.804762 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.806246 kernel: Failed to create system directory sunrpc May 8 00:41:51.806274 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.808570 kernel: Failed to create system directory sunrpc May 8 00:41:51.808596 kernel: Failed to create system directory sunrpc May 8 00:41:51.808621 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.810113 kernel: Failed to create system directory sunrpc May 8 00:41:51.810132 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.811604 kernel: Failed to create system directory sunrpc May 8 00:41:51.811630 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.813146 kernel: Failed to create system directory sunrpc May 8 00:41:51.813169 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.815517 kernel: Failed to create system directory sunrpc May 8 00:41:51.815541 kernel: Failed to create system directory sunrpc May 8 00:41:51.815555 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.817038 kernel: Failed to create system directory sunrpc May 8 00:41:51.817081 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.820200 kernel: Failed to create system directory sunrpc May 8 00:41:51.820243 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.821001 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.822477 kernel: Failed to create system directory sunrpc May 8 00:41:51.822506 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.823989 kernel: Failed to create system directory sunrpc May 8 00:41:51.824024 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.825484 kernel: Failed to create system directory sunrpc May 8 00:41:51.825505 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.848807 kubelet[1450]: E0508 00:41:51.848757 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:51.866772 kernel: Failed to create system directory sunrpc May 8 00:41:51.866902 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.867643 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.869145 kernel: Failed to create system directory sunrpc May 8 00:41:51.869177 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.870600 kernel: Failed to create system directory sunrpc May 8 00:41:51.870639 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.872116 kernel: Failed to create system directory sunrpc May 8 00:41:51.872143 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.873630 kernel: Failed to create system directory sunrpc May 8 00:41:51.873655 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.875135 kernel: Failed to create system directory sunrpc May 8 00:41:51.875175 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.876630 kernel: Failed to create system directory sunrpc May 8 00:41:51.876684 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.877381 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.878137 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.879653 kernel: Failed to create system directory sunrpc May 8 00:41:51.879711 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.880372 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.882658 kernel: Failed to create system directory sunrpc May 8 00:41:51.882724 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.883455 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.884202 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.885640 kernel: Failed to create system directory sunrpc May 8 00:41:51.885684 kernel: Failed to create system directory sunrpc May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.610000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.887165 kernel: Failed to create system directory sunrpc May 8 00:41:51.904509 kernel: RPC: Registered named UNIX socket transport module. May 8 00:41:51.904581 kernel: RPC: Registered udp transport module. May 8 00:41:51.904633 kernel: RPC: Registered tcp transport module. May 8 00:41:51.905239 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. May 8 00:41:51.610000 audit[3079]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5617e7a84ad0 a1=1a810c a2=5617d97a02b0 a3=5 items=6 ppid=67 pid=3079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:51.610000 audit: CWD cwd="/" May 8 00:41:51.610000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:41:51.610000 audit: PATH item=1 name=(null) inode=24842 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:41:51.610000 audit: PATH item=2 name=(null) inode=24842 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:41:51.610000 audit: PATH item=3 name=(null) inode=24843 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:41:51.610000 audit: PATH item=4 name=(null) inode=24842 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:41:51.610000 audit: PATH item=5 name=(null) inode=24844 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 8 00:41:51.610000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.966783 kernel: Failed to create system directory nfs May 8 00:41:51.966821 kernel: Failed to create system directory nfs May 8 00:41:51.966837 kernel: Failed to create system directory nfs May 8 00:41:51.966850 kernel: Failed to create system directory nfs May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.968577 kernel: Failed to create system directory nfs May 8 00:41:51.968630 kernel: Failed to create system directory nfs May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.970386 kernel: Failed to create system directory nfs May 8 00:41:51.970426 kernel: Failed to create system directory nfs May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.972160 kernel: Failed to create system directory nfs May 8 00:41:51.972199 kernel: Failed to create system directory nfs May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.974836 kernel: Failed to create system directory nfs May 8 00:41:51.974862 kernel: Failed to create system directory nfs May 8 00:41:51.974879 kernel: Failed to create system directory nfs May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.976607 kernel: Failed to create system directory nfs May 8 00:41:51.976627 kernel: Failed to create system directory nfs May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.978427 kernel: Failed to create system directory nfs May 8 00:41:51.978451 kernel: Failed to create system directory nfs May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.980247 kernel: Failed to create system directory nfs May 8 00:41:51.980289 kernel: Failed to create system directory nfs May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.982040 kernel: Failed to create system directory nfs May 8 00:41:51.982072 kernel: Failed to create system directory nfs May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.983801 kernel: Failed to create system directory nfs May 8 00:41:51.983837 kernel: Failed to create system directory nfs May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.985607 kernel: Failed to create system directory nfs May 8 00:41:51.985650 kernel: Failed to create system directory nfs May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.987380 kernel: Failed to create system directory nfs May 8 00:41:51.987415 kernel: Failed to create system directory nfs May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.989204 kernel: Failed to create system directory nfs May 8 00:41:51.989237 kernel: Failed to create system directory nfs May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.991029 kernel: Failed to create system directory nfs May 8 00:41:51.991080 kernel: Failed to create system directory nfs May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.992788 kernel: Failed to create system directory nfs May 8 00:41:51.992824 kernel: Failed to create system directory nfs May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.994520 kernel: Failed to create system directory nfs May 8 00:41:51.994550 kernel: Failed to create system directory nfs May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.996328 kernel: Failed to create system directory nfs May 8 00:41:51.996363 kernel: Failed to create system directory nfs May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.998196 kernel: Failed to create system directory nfs May 8 00:41:51.998226 kernel: Failed to create system directory nfs May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.000049 kernel: Failed to create system directory nfs May 8 00:41:52.000076 kernel: Failed to create system directory nfs May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.001526 kernel: Failed to create system directory nfs May 8 00:41:52.001567 kernel: Failed to create system directory nfs May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.003014 kernel: Failed to create system directory nfs May 8 00:41:52.003064 kernel: Failed to create system directory nfs May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.004669 kernel: Failed to create system directory nfs May 8 00:41:52.004697 kernel: Failed to create system directory nfs May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.006430 kernel: Failed to create system directory nfs May 8 00:41:52.006456 kernel: Failed to create system directory nfs May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.008008 kernel: Failed to create system directory nfs May 8 00:41:52.008047 kernel: Failed to create system directory nfs May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.009395 kernel: Failed to create system directory nfs May 8 00:41:52.009428 kernel: Failed to create system directory nfs May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.011746 kernel: Failed to create system directory nfs May 8 00:41:52.011794 kernel: Failed to create system directory nfs May 8 00:41:52.011819 kernel: Failed to create system directory nfs May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.013204 kernel: Failed to create system directory nfs May 8 00:41:52.013237 kernel: Failed to create system directory nfs May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.045309 kernel: Failed to create system directory nfs May 8 00:41:52.045421 kernel: Failed to create system directory nfs May 8 00:41:51.947000 audit[3079]: AVC avc: denied { confidentiality } for pid=3079 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:51.947000 audit[3079]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5617e7ca59b0 a1=16ea84 a2=5617d97a02b0 a3=5 items=0 ppid=67 pid=3079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:51.947000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 8 00:41:52.070010 kernel: FS-Cache: Netfs 'nfs' registered for caching May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.109032 kernel: Failed to create system directory nfs4 May 8 00:41:52.109091 kernel: Failed to create system directory nfs4 May 8 00:41:52.109115 kernel: Failed to create system directory nfs4 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.111267 kernel: Failed to create system directory nfs4 May 8 00:41:52.111291 kernel: Failed to create system directory nfs4 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.112003 kernel: Failed to create system directory nfs4 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.113499 kernel: Failed to create system directory nfs4 May 8 00:41:52.113520 kernel: Failed to create system directory nfs4 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.115070 kernel: Failed to create system directory nfs4 May 8 00:41:52.115148 kernel: Failed to create system directory nfs4 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.116651 kernel: Failed to create system directory nfs4 May 8 00:41:52.116707 kernel: Failed to create system directory nfs4 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.117436 kernel: Failed to create system directory nfs4 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.119713 kernel: Failed to create system directory nfs4 May 8 00:41:52.119771 kernel: Failed to create system directory nfs4 May 8 00:41:52.119793 kernel: Failed to create system directory nfs4 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.121286 kernel: Failed to create system directory nfs4 May 8 00:41:52.121320 kernel: Failed to create system directory nfs4 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.123589 kernel: Failed to create system directory nfs4 May 8 00:41:52.123679 kernel: Failed to create system directory nfs4 May 8 00:41:52.123722 kernel: Failed to create system directory nfs4 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.125035 kernel: Failed to create system directory nfs4 May 8 00:41:52.125064 kernel: Failed to create system directory nfs4 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.126455 kernel: Failed to create system directory nfs4 May 8 00:41:52.126507 kernel: Failed to create system directory nfs4 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.128001 kernel: Failed to create system directory nfs4 May 8 00:41:52.128046 kernel: Failed to create system directory nfs4 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.129518 kernel: Failed to create system directory nfs4 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.130350 kernel: Failed to create system directory nfs4 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.131225 kernel: Failed to create system directory nfs4 May 8 00:41:52.131255 kernel: Failed to create system directory nfs4 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.131999 kernel: Failed to create system directory nfs4 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.133511 kernel: Failed to create system directory nfs4 May 8 00:41:52.133541 kernel: Failed to create system directory nfs4 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.135145 kernel: Failed to create system directory nfs4 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.136663 kernel: Failed to create system directory nfs4 May 8 00:41:52.136683 kernel: Failed to create system directory nfs4 May 8 00:41:52.136738 kernel: Failed to create system directory nfs4 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.138217 kernel: Failed to create system directory nfs4 May 8 00:41:52.138256 kernel: Failed to create system directory nfs4 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.139005 kernel: Failed to create system directory nfs4 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.140415 kernel: Failed to create system directory nfs4 May 8 00:41:52.140442 kernel: Failed to create system directory nfs4 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.142720 kernel: Failed to create system directory nfs4 May 8 00:41:52.142762 kernel: Failed to create system directory nfs4 May 8 00:41:52.142780 kernel: Failed to create system directory nfs4 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.144294 kernel: Failed to create system directory nfs4 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.145139 kernel: Failed to create system directory nfs4 May 8 00:41:52.145185 kernel: Failed to create system directory nfs4 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.146651 kernel: Failed to create system directory nfs4 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.147417 kernel: Failed to create system directory nfs4 May 8 00:41:52.147452 kernel: Failed to create system directory nfs4 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.148990 kernel: Failed to create system directory nfs4 May 8 00:41:52.149030 kernel: Failed to create system directory nfs4 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.150447 kernel: Failed to create system directory nfs4 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.151339 kernel: Failed to create system directory nfs4 May 8 00:41:52.151383 kernel: Failed to create system directory nfs4 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.153609 kernel: Failed to create system directory nfs4 May 8 00:41:52.153679 kernel: Failed to create system directory nfs4 May 8 00:41:52.153699 kernel: Failed to create system directory nfs4 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.155082 kernel: Failed to create system directory nfs4 May 8 00:41:52.155120 kernel: Failed to create system directory nfs4 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.156572 kernel: Failed to create system directory nfs4 May 8 00:41:52.156603 kernel: Failed to create system directory nfs4 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.158101 kernel: Failed to create system directory nfs4 May 8 00:41:52.158132 kernel: Failed to create system directory nfs4 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.159563 kernel: Failed to create system directory nfs4 May 8 00:41:52.159600 kernel: Failed to create system directory nfs4 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.200150 kernel: Failed to create system directory nfs4 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.201009 kernel: Failed to create system directory nfs4 May 8 00:41:52.201038 kernel: Failed to create system directory nfs4 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.202529 kernel: Failed to create system directory nfs4 May 8 00:41:52.202570 kernel: Failed to create system directory nfs4 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.204006 kernel: Failed to create system directory nfs4 May 8 00:41:52.204054 kernel: Failed to create system directory nfs4 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.205478 kernel: Failed to create system directory nfs4 May 8 00:41:52.205526 kernel: Failed to create system directory nfs4 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.207684 kernel: Failed to create system directory nfs4 May 8 00:41:52.207729 kernel: Failed to create system directory nfs4 May 8 00:41:52.207763 kernel: Failed to create system directory nfs4 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.209199 kernel: Failed to create system directory nfs4 May 8 00:41:52.209235 kernel: Failed to create system directory nfs4 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.210724 kernel: Failed to create system directory nfs4 May 8 00:41:52.210764 kernel: Failed to create system directory nfs4 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.212311 kernel: Failed to create system directory nfs4 May 8 00:41:52.212462 kernel: Failed to create system directory nfs4 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.214152 kernel: Failed to create system directory nfs4 May 8 00:41:52.214202 kernel: Failed to create system directory nfs4 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.215782 kernel: Failed to create system directory nfs4 May 8 00:41:52.215821 kernel: Failed to create system directory nfs4 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.217637 kernel: Failed to create system directory nfs4 May 8 00:41:52.217862 kernel: Failed to create system directory nfs4 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.219443 kernel: Failed to create system directory nfs4 May 8 00:41:52.219487 kernel: Failed to create system directory nfs4 May 8 00:41:52.096000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.396483 kernel: NFS: Registering the id_resolver key type May 8 00:41:52.396795 kernel: Key type id_resolver registered May 8 00:41:52.396813 kernel: Key type id_legacy registered May 8 00:41:52.096000 audit[3084]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7ff3629ce010 a1=2093dc a2=562a538862b0 a3=5 items=0 ppid=67 pid=3084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:52.096000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 May 8 00:41:52.417000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.417000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.422534 kernel: Failed to create system directory rpcgss May 8 00:41:52.422737 kernel: Failed to create system directory rpcgss May 8 00:41:52.422759 kernel: Failed to create system directory rpcgss May 8 00:41:52.417000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.417000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.424009 kernel: Failed to create system directory rpcgss May 8 00:41:52.424058 kernel: Failed to create system directory rpcgss May 8 00:41:52.417000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.417000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.425418 kernel: Failed to create system directory rpcgss May 8 00:41:52.425453 kernel: Failed to create system directory rpcgss May 8 00:41:52.417000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.426212 kernel: Failed to create system directory rpcgss May 8 00:41:52.417000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.417000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.427663 kernel: Failed to create system directory rpcgss May 8 00:41:52.427715 kernel: Failed to create system directory rpcgss May 8 00:41:52.417000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.417000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.429116 kernel: Failed to create system directory rpcgss May 8 00:41:52.429155 kernel: Failed to create system directory rpcgss May 8 00:41:52.417000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.417000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.430554 kernel: Failed to create system directory rpcgss May 8 00:41:52.430581 kernel: Failed to create system directory rpcgss May 8 00:41:52.417000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.417000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.432031 kernel: Failed to create system directory rpcgss May 8 00:41:52.432050 kernel: Failed to create system directory rpcgss May 8 00:41:52.417000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.417000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.433489 kernel: Failed to create system directory rpcgss May 8 00:41:52.433508 kernel: Failed to create system directory rpcgss May 8 00:41:52.417000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.434246 kernel: Failed to create system directory rpcgss May 8 00:41:52.417000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.417000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.435690 kernel: Failed to create system directory rpcgss May 8 00:41:52.435719 kernel: Failed to create system directory rpcgss May 8 00:41:52.417000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.417000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.437154 kernel: Failed to create system directory rpcgss May 8 00:41:52.437186 kernel: Failed to create system directory rpcgss May 8 00:41:52.417000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.417000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.438612 kernel: Failed to create system directory rpcgss May 8 00:41:52.438668 kernel: Failed to create system directory rpcgss May 8 00:41:52.417000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.417000 audit[3085]: AVC avc: denied { confidentiality } for pid=3085 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 8 00:41:52.440070 kernel: Failed to create system directory rpcgss May 8 00:41:52.417000 audit[3085]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fb5f2934010 a1=70b4c a2=55e0191892b0 a3=5 items=0 ppid=67 pid=3085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:52.417000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 May 8 00:41:52.534570 nfsidmap[3094]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' May 8 00:41:52.538322 nfsidmap[3097]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' May 8 00:41:52.548000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2708 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 8 00:41:52.548000 audit[1272]: AVC avc: denied { watch_reads } for pid=1272 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2708 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 8 00:41:52.548000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2708 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 8 00:41:52.548000 audit[1272]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55dd37820250 a2=10 a3=2468192a2ba81801 items=0 ppid=1 pid=1272 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:52.548000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2708 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 8 00:41:52.548000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 8 00:41:52.548000 audit[1272]: AVC avc: denied { watch_reads } for pid=1272 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2708 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 8 00:41:52.548000 audit[1272]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55dd37820250 a2=10 a3=2468192a2ba81801 items=0 ppid=1 pid=1272 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:52.548000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 8 00:41:52.548000 audit[1272]: AVC avc: denied { watch_reads } for pid=1272 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2708 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 8 00:41:52.548000 audit[1272]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55dd37820250 a2=10 a3=2468192a2ba81801 items=0 ppid=1 pid=1272 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:52.548000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 8 00:41:52.653309 env[1196]: time="2025-05-08T00:41:52.653174904Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:d0a163f8-a9b6-49c8-8f5e-9c5e34ebf374,Namespace:default,Attempt:0,}" May 8 00:41:52.849414 kubelet[1450]: E0508 00:41:52.849368 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:53.036894 kubelet[1450]: E0508 00:41:53.036863 1450 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 8 00:41:53.617401 systemd-networkd[1022]: cali5ec59c6bf6e: Link UP May 8 00:41:53.620227 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 8 00:41:53.620362 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready May 8 00:41:53.620480 systemd-networkd[1022]: cali5ec59c6bf6e: Gained carrier May 8 00:41:53.700015 env[1196]: 2025-05-08 00:41:53.314 [INFO][3103] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.33-k8s-test--pod--1-eth0 default d0a163f8-a9b6-49c8-8f5e-9c5e34ebf374 1318 0 2025-05-08 00:41:32 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.33 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="b0c9a23650a7c1d5999451bc86d51d6f4882787501540316b234b894d4f8e639" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.33-k8s-test--pod--1-" May 8 00:41:53.700015 env[1196]: 2025-05-08 00:41:53.314 [INFO][3103] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="b0c9a23650a7c1d5999451bc86d51d6f4882787501540316b234b894d4f8e639" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.33-k8s-test--pod--1-eth0" May 8 00:41:53.700015 env[1196]: 2025-05-08 00:41:53.338 [INFO][3118] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b0c9a23650a7c1d5999451bc86d51d6f4882787501540316b234b894d4f8e639" HandleID="k8s-pod-network.b0c9a23650a7c1d5999451bc86d51d6f4882787501540316b234b894d4f8e639" Workload="10.0.0.33-k8s-test--pod--1-eth0" May 8 00:41:53.700015 env[1196]: 2025-05-08 00:41:53.346 [INFO][3118] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b0c9a23650a7c1d5999451bc86d51d6f4882787501540316b234b894d4f8e639" HandleID="k8s-pod-network.b0c9a23650a7c1d5999451bc86d51d6f4882787501540316b234b894d4f8e639" Workload="10.0.0.33-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002df6a0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.33", "pod":"test-pod-1", "timestamp":"2025-05-08 00:41:53.338105811 +0000 UTC"}, Hostname:"10.0.0.33", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 8 00:41:53.700015 env[1196]: 2025-05-08 00:41:53.346 [INFO][3118] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 8 00:41:53.700015 env[1196]: 2025-05-08 00:41:53.346 [INFO][3118] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 8 00:41:53.700015 env[1196]: 2025-05-08 00:41:53.346 [INFO][3118] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.33' May 8 00:41:53.700015 env[1196]: 2025-05-08 00:41:53.347 [INFO][3118] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b0c9a23650a7c1d5999451bc86d51d6f4882787501540316b234b894d4f8e639" host="10.0.0.33" May 8 00:41:53.700015 env[1196]: 2025-05-08 00:41:53.351 [INFO][3118] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.33" May 8 00:41:53.700015 env[1196]: 2025-05-08 00:41:53.354 [INFO][3118] ipam/ipam.go 489: Trying affinity for 192.168.91.128/26 host="10.0.0.33" May 8 00:41:53.700015 env[1196]: 2025-05-08 00:41:53.356 [INFO][3118] ipam/ipam.go 155: Attempting to load block cidr=192.168.91.128/26 host="10.0.0.33" May 8 00:41:53.700015 env[1196]: 2025-05-08 00:41:53.358 [INFO][3118] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.91.128/26 host="10.0.0.33" May 8 00:41:53.700015 env[1196]: 2025-05-08 00:41:53.358 [INFO][3118] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.91.128/26 handle="k8s-pod-network.b0c9a23650a7c1d5999451bc86d51d6f4882787501540316b234b894d4f8e639" host="10.0.0.33" May 8 00:41:53.700015 env[1196]: 2025-05-08 00:41:53.359 [INFO][3118] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.b0c9a23650a7c1d5999451bc86d51d6f4882787501540316b234b894d4f8e639 May 8 00:41:53.700015 env[1196]: 2025-05-08 00:41:53.379 [INFO][3118] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.91.128/26 handle="k8s-pod-network.b0c9a23650a7c1d5999451bc86d51d6f4882787501540316b234b894d4f8e639" host="10.0.0.33" May 8 00:41:53.700015 env[1196]: 2025-05-08 00:41:53.613 [INFO][3118] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.91.132/26] block=192.168.91.128/26 handle="k8s-pod-network.b0c9a23650a7c1d5999451bc86d51d6f4882787501540316b234b894d4f8e639" host="10.0.0.33" May 8 00:41:53.700015 env[1196]: 2025-05-08 00:41:53.613 [INFO][3118] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.91.132/26] handle="k8s-pod-network.b0c9a23650a7c1d5999451bc86d51d6f4882787501540316b234b894d4f8e639" host="10.0.0.33" May 8 00:41:53.700015 env[1196]: 2025-05-08 00:41:53.613 [INFO][3118] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 8 00:41:53.700015 env[1196]: 2025-05-08 00:41:53.613 [INFO][3118] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.91.132/26] IPv6=[] ContainerID="b0c9a23650a7c1d5999451bc86d51d6f4882787501540316b234b894d4f8e639" HandleID="k8s-pod-network.b0c9a23650a7c1d5999451bc86d51d6f4882787501540316b234b894d4f8e639" Workload="10.0.0.33-k8s-test--pod--1-eth0" May 8 00:41:53.700015 env[1196]: 2025-05-08 00:41:53.615 [INFO][3103] cni-plugin/k8s.go 386: Populated endpoint ContainerID="b0c9a23650a7c1d5999451bc86d51d6f4882787501540316b234b894d4f8e639" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.33-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.33-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"d0a163f8-a9b6-49c8-8f5e-9c5e34ebf374", ResourceVersion:"1318", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 41, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.33", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.91.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:41:53.701263 env[1196]: 2025-05-08 00:41:53.615 [INFO][3103] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.91.132/32] ContainerID="b0c9a23650a7c1d5999451bc86d51d6f4882787501540316b234b894d4f8e639" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.33-k8s-test--pod--1-eth0" May 8 00:41:53.701263 env[1196]: 2025-05-08 00:41:53.615 [INFO][3103] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="b0c9a23650a7c1d5999451bc86d51d6f4882787501540316b234b894d4f8e639" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.33-k8s-test--pod--1-eth0" May 8 00:41:53.701263 env[1196]: 2025-05-08 00:41:53.620 [INFO][3103] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b0c9a23650a7c1d5999451bc86d51d6f4882787501540316b234b894d4f8e639" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.33-k8s-test--pod--1-eth0" May 8 00:41:53.701263 env[1196]: 2025-05-08 00:41:53.621 [INFO][3103] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="b0c9a23650a7c1d5999451bc86d51d6f4882787501540316b234b894d4f8e639" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.33-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.33-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"d0a163f8-a9b6-49c8-8f5e-9c5e34ebf374", ResourceVersion:"1318", Generation:0, CreationTimestamp:time.Date(2025, time.May, 8, 0, 41, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.33", ContainerID:"b0c9a23650a7c1d5999451bc86d51d6f4882787501540316b234b894d4f8e639", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.91.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"82:61:42:04:97:65", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 8 00:41:53.701263 env[1196]: 2025-05-08 00:41:53.698 [INFO][3103] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="b0c9a23650a7c1d5999451bc86d51d6f4882787501540316b234b894d4f8e639" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.33-k8s-test--pod--1-eth0" May 8 00:41:53.708000 audit[3140]: NETFILTER_CFG table=filter:93 family=2 entries=38 op=nft_register_chain pid=3140 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 8 00:41:53.708000 audit[3140]: SYSCALL arch=c000003e syscall=46 success=yes exit=19400 a0=3 a1=7ffe44caa4f0 a2=0 a3=7ffe44caa4dc items=0 ppid=2295 pid=3140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:53.708000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 8 00:41:53.758294 env[1196]: time="2025-05-08T00:41:53.758211991Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 8 00:41:53.758294 env[1196]: time="2025-05-08T00:41:53.758254741Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 8 00:41:53.758294 env[1196]: time="2025-05-08T00:41:53.758267725Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 8 00:41:53.758503 env[1196]: time="2025-05-08T00:41:53.758394103Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b0c9a23650a7c1d5999451bc86d51d6f4882787501540316b234b894d4f8e639 pid=3148 runtime=io.containerd.runc.v2 May 8 00:41:53.774274 systemd[1]: Started cri-containerd-b0c9a23650a7c1d5999451bc86d51d6f4882787501540316b234b894d4f8e639.scope. May 8 00:41:53.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:53.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:53.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:53.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:53.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:53.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:53.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:53.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:53.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:53.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:53.782000 audit: BPF prog-id=126 op=LOAD May 8 00:41:53.783000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:53.783000 audit[3158]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3148 pid=3158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:53.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230633961323336353061376331643539393934353162633836643531 May 8 00:41:53.783000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:53.783000 audit[3158]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3148 pid=3158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:53.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230633961323336353061376331643539393934353162633836643531 May 8 00:41:53.783000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:53.783000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:53.783000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:53.783000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:53.783000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:53.783000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:53.783000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:53.783000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:53.783000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:53.783000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:53.783000 audit: BPF prog-id=127 op=LOAD May 8 00:41:53.783000 audit[3158]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c000314dd0 items=0 ppid=3148 pid=3158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:53.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230633961323336353061376331643539393934353162633836643531 May 8 00:41:53.783000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:53.783000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:53.783000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:53.783000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:53.783000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:53.783000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:53.783000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:53.783000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:53.783000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:53.783000 audit: BPF prog-id=128 op=LOAD May 8 00:41:53.783000 audit[3158]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c000314e18 items=0 ppid=3148 pid=3158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:53.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230633961323336353061376331643539393934353162633836643531 May 8 00:41:53.783000 audit: BPF prog-id=128 op=UNLOAD May 8 00:41:53.783000 audit: BPF prog-id=127 op=UNLOAD May 8 00:41:53.783000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:53.783000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:53.783000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:53.783000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:53.783000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:53.783000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:53.783000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:53.783000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:53.783000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:53.783000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:53.783000 audit: BPF prog-id=129 op=LOAD May 8 00:41:53.783000 audit[3158]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c000315228 items=0 ppid=3148 pid=3158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:53.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230633961323336353061376331643539393934353162633836643531 May 8 00:41:53.785061 systemd-resolved[1149]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 8 00:41:53.804468 env[1196]: time="2025-05-08T00:41:53.804425102Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:d0a163f8-a9b6-49c8-8f5e-9c5e34ebf374,Namespace:default,Attempt:0,} returns sandbox id \"b0c9a23650a7c1d5999451bc86d51d6f4882787501540316b234b894d4f8e639\"" May 8 00:41:53.805531 env[1196]: time="2025-05-08T00:41:53.805510900Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 8 00:41:53.849777 kubelet[1450]: E0508 00:41:53.849704 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:54.272372 env[1196]: time="2025-05-08T00:41:54.272315895Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:41:54.274727 env[1196]: time="2025-05-08T00:41:54.274678388Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:41:54.276206 env[1196]: time="2025-05-08T00:41:54.276169486Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:41:54.277875 env[1196]: time="2025-05-08T00:41:54.277850842Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 8 00:41:54.278579 env[1196]: time="2025-05-08T00:41:54.278543702Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa\"" May 8 00:41:54.280512 env[1196]: time="2025-05-08T00:41:54.280487069Z" level=info msg="CreateContainer within sandbox \"b0c9a23650a7c1d5999451bc86d51d6f4882787501540316b234b894d4f8e639\" for container &ContainerMetadata{Name:test,Attempt:0,}" May 8 00:41:54.294653 env[1196]: time="2025-05-08T00:41:54.294591458Z" level=info msg="CreateContainer within sandbox \"b0c9a23650a7c1d5999451bc86d51d6f4882787501540316b234b894d4f8e639\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"bdf99ac7a70b6f04301a66b2838936e4904af1cab07c63c7a69c62a1e9d94346\"" May 8 00:41:54.295165 env[1196]: time="2025-05-08T00:41:54.295090044Z" level=info msg="StartContainer for \"bdf99ac7a70b6f04301a66b2838936e4904af1cab07c63c7a69c62a1e9d94346\"" May 8 00:41:54.310562 systemd[1]: Started cri-containerd-bdf99ac7a70b6f04301a66b2838936e4904af1cab07c63c7a69c62a1e9d94346.scope. May 8 00:41:54.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:54.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:54.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:54.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:54.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:54.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:54.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:54.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:54.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:54.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:54.322000 audit: BPF prog-id=130 op=LOAD May 8 00:41:54.323000 audit[3189]: AVC avc: denied { bpf } for pid=3189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:54.323000 audit[3189]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3148 pid=3189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:54.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264663939616337613730623666303433303161363662323833383933 May 8 00:41:54.323000 audit[3189]: AVC avc: denied { perfmon } for pid=3189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:54.323000 audit[3189]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3148 pid=3189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:54.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264663939616337613730623666303433303161363662323833383933 May 8 00:41:54.323000 audit[3189]: AVC avc: denied { bpf } for pid=3189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:54.323000 audit[3189]: AVC avc: denied { bpf } for pid=3189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:54.323000 audit[3189]: AVC avc: denied { bpf } for pid=3189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:54.323000 audit[3189]: AVC avc: denied { perfmon } for pid=3189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:54.323000 audit[3189]: AVC avc: denied { perfmon } for pid=3189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:54.323000 audit[3189]: AVC avc: denied { perfmon } for pid=3189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:54.323000 audit[3189]: AVC avc: denied { perfmon } for pid=3189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:54.323000 audit[3189]: AVC avc: denied { perfmon } for pid=3189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:54.323000 audit[3189]: AVC avc: denied { bpf } for pid=3189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:54.323000 audit[3189]: AVC avc: denied { bpf } for pid=3189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:54.323000 audit: BPF prog-id=131 op=LOAD May 8 00:41:54.323000 audit[3189]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000328c30 items=0 ppid=3148 pid=3189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:54.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264663939616337613730623666303433303161363662323833383933 May 8 00:41:54.323000 audit[3189]: AVC avc: denied { bpf } for pid=3189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:54.323000 audit[3189]: AVC avc: denied { bpf } for pid=3189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:54.323000 audit[3189]: AVC avc: denied { perfmon } for pid=3189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:54.323000 audit[3189]: AVC avc: denied { perfmon } for pid=3189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:54.323000 audit[3189]: AVC avc: denied { perfmon } for pid=3189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:54.323000 audit[3189]: AVC avc: denied { perfmon } for pid=3189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:54.323000 audit[3189]: AVC avc: denied { perfmon } for pid=3189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:54.323000 audit[3189]: AVC avc: denied { bpf } for pid=3189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:54.323000 audit[3189]: AVC avc: denied { bpf } for pid=3189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:54.323000 audit: BPF prog-id=132 op=LOAD May 8 00:41:54.323000 audit[3189]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000328c78 items=0 ppid=3148 pid=3189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:54.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264663939616337613730623666303433303161363662323833383933 May 8 00:41:54.323000 audit: BPF prog-id=132 op=UNLOAD May 8 00:41:54.323000 audit: BPF prog-id=131 op=UNLOAD May 8 00:41:54.323000 audit[3189]: AVC avc: denied { bpf } for pid=3189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:54.323000 audit[3189]: AVC avc: denied { bpf } for pid=3189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:54.323000 audit[3189]: AVC avc: denied { bpf } for pid=3189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:54.323000 audit[3189]: AVC avc: denied { perfmon } for pid=3189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:54.323000 audit[3189]: AVC avc: denied { perfmon } for pid=3189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:54.323000 audit[3189]: AVC avc: denied { perfmon } for pid=3189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:54.323000 audit[3189]: AVC avc: denied { perfmon } for pid=3189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:54.323000 audit[3189]: AVC avc: denied { perfmon } for pid=3189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:54.323000 audit[3189]: AVC avc: denied { bpf } for pid=3189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:54.323000 audit[3189]: AVC avc: denied { bpf } for pid=3189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 8 00:41:54.323000 audit: BPF prog-id=133 op=LOAD May 8 00:41:54.323000 audit[3189]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000329088 items=0 ppid=3148 pid=3189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 8 00:41:54.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264663939616337613730623666303433303161363662323833383933 May 8 00:41:54.337939 env[1196]: time="2025-05-08T00:41:54.337891279Z" level=info msg="StartContainer for \"bdf99ac7a70b6f04301a66b2838936e4904af1cab07c63c7a69c62a1e9d94346\" returns successfully" May 8 00:41:54.746185 systemd-networkd[1022]: cali5ec59c6bf6e: Gained IPv6LL May 8 00:41:54.850217 kubelet[1450]: E0508 00:41:54.850149 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:55.333112 kubelet[1450]: I0508 00:41:55.333041 1450 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=22.858850139 podStartE2EDuration="23.333017199s" podCreationTimestamp="2025-05-08 00:41:32 +0000 UTC" firstStartedPulling="2025-05-08 00:41:53.805222439 +0000 UTC m=+79.635162966" lastFinishedPulling="2025-05-08 00:41:54.279389509 +0000 UTC m=+80.109330026" observedRunningTime="2025-05-08 00:41:55.332657283 +0000 UTC m=+81.162597810" watchObservedRunningTime="2025-05-08 00:41:55.333017199 +0000 UTC m=+81.162957716" May 8 00:41:55.797724 kubelet[1450]: E0508 00:41:55.797681 1450 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:55.850840 kubelet[1450]: E0508 00:41:55.850766 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:56.851618 kubelet[1450]: E0508 00:41:56.851516 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:57.852542 kubelet[1450]: E0508 00:41:57.852436 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:58.853305 kubelet[1450]: E0508 00:41:58.853224 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:41:59.854114 kubelet[1450]: E0508 00:41:59.854033 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 8 00:42:00.854998 kubelet[1450]: E0508 00:42:00.854909 1450 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"